Ethical hacking Chapter 3 - Network and Computer Attacks - Eric Vanderburg
Crypto
SQL Injection
Zyklus-How and Why
Cryptography
Ch11
Full Doc
CCNA Discovery 3
Hash Function
Introduction to Information Security
Firewalls