Subcategories

HackNotes Windows Security Portable Reference [Repost]

Posted By: tanas.olesya
HackNotes Windows Security Portable Reference  [Repost]

HackNotes Windows Security Portable Reference by Michael O'Dea
English | 1 July 2003 | ISBN: 0072227850 | 250 Pages | PDF | 4 MB

Secure Windows 2000 Server, Windows XP systems, and Windows Server 2003. The book explains how to follow reference matrixes of useful services for Windows and UNIX. Plus, you’ll learn best practices for trace routing and source address location.

Praxishandbuch Soziale Medien in der öffentlichen Verwaltung [Repost]

Posted By: tanas.olesya
Praxishandbuch Soziale Medien in der öffentlichen Verwaltung  [Repost]

Praxishandbuch Soziale Medien in der öffentlichen Verwaltung by Ines Mergel
German | 30 Sept. 2013 | ISBN: 3658007451 | 148 Pages | PDF | 40 MB

Das Buch richtet sich vor allem an Social-Media-Verantwortliche in der öffentlichen Verwaltung. Im Detail werden die derzeit gültigen rechtlichen Rahmenbedingungen erarbeitet und anwendungsorientiert die Vorgehensweise zur Formulierung und Implementierung von Social-Media-Strategien und -taktiken dargestellt.

Essentials of Corporate Fraud [Repost]

Posted By: tanas.olesya
Essentials of Corporate Fraud [Repost]

Essentials of Corporate Fraud by Tracy L. Coenen
English | 25 Feb. 2008 | ISBN: 047019412X | 222 Pages | PDF | 7 MB

Full of valuable tips, techniques, illustrative real–world examples, exhibits, and best practices, this handy and concise paperback will help you stay up to date on the newest thinking, strategies, developments, and technologies in corporate fraud.

CCNA Security (210-260) Cert Prep: 5 Cisco Firewall Technologies

Posted By: naag
CCNA Security (210-260) Cert Prep: 5 Cisco Firewall Technologies

CCNA Security (210-260) Cert Prep: 5 Cisco Firewall Technologies
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 257 MB
Genre: eLearning | Language: English

Linux Server Security

Posted By: naag
Linux Server Security

Linux Server Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | 667 MB
Genre: eLearning | Language: English

Linux is the first choice for any attacker now and more administrators have started moving to the system to create networks or servers for any task. This course will help you create a more secure Linux system.

Transport planning and traffic safety: making cities, roads, and vehicles safer

Posted By: DZ123
Transport planning and traffic safety: making cities, roads, and vehicles safer

Mohan, Dinesh; Tiwari, Geetam, "Transport planning and traffic safety: making cities, roads, and vehicles safer"
English | 2016 | ISBN: 1138463892 | PDF | pages: 372 | 9.1 mb

Trapping Safety into Rules: How Desirable or Avoidable is Proceduralization?

Posted By: DZ123
Trapping Safety into Rules: How Desirable or Avoidable is Proceduralization?

Mathilde Bourrier, Corinne Bieder, "Trapping Safety into Rules: How Desirable or Avoidable is Proceduralization?"
English | 2013 | ISBN: 1409452263 | EPUB | pages: 302 | 3.1 mb

AWS for Architects: Advanced Security

Posted By: naag
AWS for Architects: Advanced Security

AWS for Architects: Advanced Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | 397 MB
Genre: eLearning | Language: English

CySA+ Cert Prep: 4 Security Governance

Posted By: naag
CySA+ Cert Prep: 4 Security Governance

CySA+ Cert Prep: 4 Security Governance
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 287 MB
Genre: eLearning | Language: English

Automatic Malware Analysis: An Emulator Based Approach (Repost)

Posted By: DZ123
Automatic Malware Analysis: An Emulator Based Approach (Repost)

Heng Yin, Dawn Song, "Automatic Malware Analysis: An Emulator Based Approach"
English | 2012 | ISBN: 1461455227 | PDF | pages: 82 | 3.8 mb

Data Protection and Privacy: (In)visibilities and Infrastructures (repost)

Posted By: hill0
Data Protection and Privacy: (In)visibilities and Infrastructures (repost)

Data Protection and Privacy: (In)visibilities and Infrastructures by Ronald Leenes
English | 6 May 2017 | ISBN: 3319561774 | 320 Pages | PDF | 4.08 MB

Cryptography and Information Security in the Balkans

Posted By: step778
Cryptography and Information Security in the Balkans

Berna Ors, Bart Preneel, "Cryptography and Information Security in the Balkans"
2015 | pages: 254 | ISBN: 3319213555 | PDF | 7,0 mb

Microsoft 365: Achieving GDPR Compliance

Posted By: naag
Microsoft 365: Achieving GDPR Compliance

Microsoft 365: Achieving GDPR Compliance
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 279 MB
Genre: eLearning | Language: English

Cyber Security: Power and Technology (Repost)

Posted By: AvaxGenius
Cyber Security: Power and Technology (Repost)

Cyber Security: Power and Technology By Martti Lehto
English | PDF,EPUB | 2018 | 288 Pages | ISBN : 3319753061 | 8.77 MB

This book gathers the latest research results of scientists from different countries who have made essential contributions to the novel analysis of cyber security. Addressing open problems in the cyber world, the book consists of two parts. Part I focuses on cyber operations as a new tool in global security policy, while Part II focuses on new cyber security technologies when building cyber power capabilities. The topics discussed include strategic perspectives on cyber security and cyber warfare, cyber security implementation, strategic communication, trusted computing, password cracking, systems security and network security among others.

FBI Guide to Concealable Weapons [Repost]

Posted By: tanas.olesya
FBI Guide to Concealable Weapons [Repost]

FBI Guide to Concealable Weapons by F.B.I.
English | July 2004 | ISBN: 1581604475 | 88 Pages | PDF | 2 MB

In this exclusive reprint, you will see metal, plastic and ceramic knives hidden in pens, keys, belt buckles, jewelry, canes and cigarette lighters, as well as impact weapons disguised as keychains, and items hollowed out for the possible concealment of explosives.