နည္းပညာဆိုင္ရာ Tricks & Tips E-Books မ်ား (Education Purpose Only)
- 2007 Microsoft Office Test Drive.pdf
- 99 Tools to Help You Generate Leads with Socia Media.pdf
- A Newbie's Initiation To Linux.pdf
- A Teacher's Life Simplified - Microsoft Windows 7.pdf
- Building Your Business with Facebook Pages.pdf
- Computer Basics Quick Reference Card.pdf
- DELL Windows 7 Security and Compliance.pdf
- Forrester Gray - Corporate Desktop Operating System and Browser Trends,.pdf
- Google Chrome Keyboard Shortcuts.pdf
- Hackerproof - Your Guide to PC Security.pdf
- Hard Drive of the Future - Your Guide to Solid State Drives.pdf
- How To Easily Build Your Own Cheap Computer.pdf
- How to Integrate Social Media and Email Marketing.pdf
- Internet Explorer 9 Quick Reference Card.pdf
- Internet Explorer Shortcuts.pdf
- Internet-Marketing-Guidebook.pdf
- Introduction to Linux - A Hands on Guide.pdf
- Keyboard Shortcuts For Mac OS X Firefox.pdf
- Laptop Buying Guide 2011.pdf
- Mac OS X Keyboard Shortcuts.pdf
- A Review of Rootkits, Bots, Trojan Horses and RATs.pdf
- Microsoft Outlook Shortcut Keys.pdf
- Microsoft Windows 7 Quick Reference Card.pdf
- Microsoft Windows Vista Quick Reference Card.pdf
- Microsoft Word 2010 Quick Reference Card.pdf
- Office 2010 - Ultimate Tips and Tricks.pdf
- Old Computer, New Life - Restoring Old Hardware with Ubuntu.pdf
- Online Marketing Inside Out.pdf
- Online Networking Guide.pdf
- Opera Shortcuts.pdf
- PC Maintenance Guide.pdf
- PC Security Guide.pdf
- PC Security Handbook.pdf
- Popular Applications with Critical Vulnerabilities.pdf
- SelfCensorshiponFacebook.pdf
- Slackware Linux Essentials.pdf
- Sophos - Stopping Fake Antivirus - How to Keep Scareware off Your Network.pdf
- Stuff Happens - The Backup and Restore Guide.pdf
- The Risks of Social Media and What Can be Done to Manage Them.pdf
- The Small Business Marketing Guide - 7 Steps That Will Transform Your Business.pdf
- The Windows 7 Guide - From Newbies to Pros.pdf
- Threatsaurus - The A-Z ofComputer and Data Security Threats.pdf
- Ubuntu - An Absolute Beginner's Guide.pdf
- Using the Magic Pocket - A Dropbox Guide.pdf
- Windows ...On Speed.pdf
- Windows 7 or Vista Command Prompt Commands.pdf
- Windows Keyboard Shortcuts.pdf
- Windows Server 2008 Quick Reference Guide.pdf
- Windows Vista - The Pocket Guide.pdf
- Windows Vista Customization Manual.pdf
- Your PC, Inside and Out Part I.pdf
- Your PC, Inside and Out Part II.pdf
- iPad - A Magical and Revolutionary Guide Featuring the 40 Best Free Apps.pdf
- iPad Quick Reference Card.pdf
- iPhone Secret Tips & Shorcuts.pdf
- iPhone Secret Tips & Shortcuts.pdf
- Hacking The Windows Registry.pdf
- Hugo Cornwall - The Hacker's Handbook.pdf
- Hacking into computer systems - a beginners guide.pdf
- Hacking_IIS_Servers.pdf
- A Beginners Guide To Hacking Computer Systems.pdf
- Attacking the DNS Protocol.pdf
- Auerbach.Practical.Hacking.Techniques.and.Countermeasures.Nov.2006.pdf
- Computer - Hackers Secrets - e-book.pdf
- Crc Press - The Hacker'S Handbook.pdf
- Credit.Card.Visa.Hack.Ucam.Cl.Tr.560.[223.kB_www.netz.ru].pdf
- DangerousGoogle-SearchingForSecrets.pdf
- Dummies - Hack How To Create Keygens (1).pdf
- EBIOS-1-GuideMethodologique-2010-01-25.pdf
- Guide-to-Hacking-with-sub7 (1).doc
- Hack IT Security Through Penetration Testing.pdf
- Hack Proofing - Your Network - Internet Tradecraft.pdf
- Hacking-The_Art_of_Exploitation.rar
- Bsd-hacks.pdf
- Cracking-sql-passwords.pdf
- ebay-hacks-100-industrial-strength-tips-and-tools.pdf
- ethical hacking, student guide.pdf
- google-hacks.pdf
- hacking gmail.pdf
- menace650.pdf
- Hacking.part01.rar
- Hacking.part02(2).rar
- Hacking.part02.rar
- Hacking.part03.rar
- Hacking.part04(2).rar
- Hacking.part04.rar
- Hacking.part05.rar
- Hacking.part06.rar
- Hacking.part07.rar
- Hacking.part08.rar
- Hacking.part09.rar
- Hacking.part10.rar
- Hacking.part11.rar
- Hacking.part12.rar
- Hacking_GMail.rar
- HTTP-Request-Smuggling.pdf
- HTTPResponseSplitting.pdf
- Overtaking-Google-Desktop.pdf
- Web-App-Security-Automated-Scanning.pdf
- Web_App_Security_jp.pdf
- blind-xpath-injection.pdf
- css-explained.pdf
- developingsecurewebapps.pdf
- hack-web-apps-cookie-poisoning.pdf
- hackerattacks.pdf
- testing-privilege-escalation.pdf
Good Luck... ကိုမ်ဳိး
http://lwanmapyay.blogspot.com/