0 | - | ||
4.13 | - | ||
4.22 | - | ||
4.21 | - | ||
4.29 | - | ||
4.59 | 4.0 | ||
3.83 | - | ||
3.76 | - | ||
4.18 | - | ||
4.08 | - | ||
3.83 | 5.0 | ||
4.21 | - | ||
3.2 | 4.0 | ||
3.5 | - | ||
3.88 | - | ||
3.86 | 5.0 | ||
3.6 | 4.0 | ||
4.32 | - | ||
3.68 | - | ||
0 | - | ||
2.98 | - | ||
3.79 | - | ||
4.12 | - | ||
4.1 | - | ||
4.03 | - | ||
3.6 | - | ||
4.21 | - | ||
3.73 | - | ||
4.01 | - | ||
3.98 | - | ||
4 | - | ||
3 | - | ||
3.38 | - | ||
![]() Applied Cryptanalysis Applied Cryptanalysis: Breaking Ciphers in the Real World
| 0 | - | |
0 | - | ||
![]() The Shellcoder's Handbook The Shellcoder's Handbook: Discovering and Exploiting Security Holes
| 0 | - | |
3.98 | - | ||
4.18 | - | ||
3.8 | - | ||
3.45 | - |