Subcategories

Gray Hat Hacking The Ethical Hackers Handbook (Repost)

Posted By: igor_lv
Gray Hat Hacking The Ethical Hackers Handbook (Repost)

Gray Hat Hacking The Ethical Hackers Handbook - Allen Harper
2011 | 3rd Edition | ISBN: 0071742557 | PDF | 720 pages | 12 Mb

Professional Rootkits

Posted By: First1
Professional Rootkits

Professional Rootkits by Ric Vieler
English | March 12th, 2007 | ISBN: 0470101547 | 359 Pages | PDF | 4.76 MB

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution.

Post-Quantum Cryptography [Repost]

Posted By: hill0
Post-Quantum Cryptography [Repost]

Post-Quantum Cryptography by Daniel J. Bernstein
English | 19 Nov. 2008 | ISBN: 3540887016 | 256 Pages | PDF | 2.21 MB

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms,

Tiger Check: Automating the US Air Force Fighter Pilot in Air-to-Air Combat, 1950–1980

Posted By: First1
Tiger Check: Automating the US Air Force Fighter Pilot in Air-to-Air Combat, 1950–1980

Tiger Check: Automating the US Air Force Fighter Pilot in Air-to-Air Combat, 1950–1980 by Steven A. Fino
English | October 17th, 2017 | ISBN: 1421423278, 9781421423272 | 449 Pages | True PDF | 26.74 MB

Spurred by their commanders during the Korean War to be "tigers," aggressive and tenacious American fighter pilots charged headlong into packs of fireball-spewing enemy MiGs, relying on their keen eyesight, piloting finesse, and steady trigger fingers to achieve victory.

Cloud-Based Cyber-Physical Systems in Manufacturing

Posted By: Underaglassmoon
Cloud-Based Cyber-Physical Systems in Manufacturing

Cloud-Based Cyber-Physical Systems in Manufacturing
Springer | English | Dec 2017 | ISBN-10: 331967692X | 404 pages | PDF | 17.73 mb

by Lihui Wang (Author),‎ Xi Vincent Wang (Author)

Compilation for Secure Multi-party Computation

Posted By: Underaglassmoon
Compilation for Secure Multi-party Computation

Compilation for Secure Multi-party Computation
Springer | English | Dec 2017 | ISBN-10: 3319675214 | 93 pages | PDF | 1.68 mb

by Stefan Katzenbeisser (Author),‎ Niklas Büscher (Author)

Network Security Metrics

Posted By: hill0
Network Security Metrics

Network Security Metrics by Lingyu Wang
English | 3 Dec. 2017 | ISBN: 3319665049 | 224 Pages | PDF/EPUB | 9.49 MB

This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks

VCP6-NV Official Cert Guide (Exam #2V0-641)

Posted By: First1
VCP6-NV Official Cert Guide (Exam #2V0-641)

VCP6-NV Official Cert Guide (Exam #2V0-641) by Elver Sena Sosa
English | August 27th, 2016 (2017 Edition) | ISBN: 0789754800, 9332582750, 9780789754806 | 704 Pages | True PDF | 27.23 MB

The VCP6-NV Official Cert Guide (Exam #2V0-641) presents you with an organized test preparation routine through the use of proven series elements and techniques. Do I Know This Already? quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

VCP6-NV Official Cert Guide (Exam #2V0-641)

Posted By: First1
VCP6-NV Official Cert Guide (Exam #2V0-641)

VCP6-NV Official Cert Guide (Exam #2V0-641) by Elver Sena Sosa
English | August 27th, 2016 (2017 Edition) | ISBN: 0789754800, 9332582750 | 704 Pages | EPUB | 55.71 MB

The VCP6-NV Official Cert Guide (Exam #2V0-641) presents you with an organized test preparation routine through the use of proven series elements and techniques. Do I Know This Already? quizzes open each chapter and allow you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly.

Risks and Security of Internet and Systems

Posted By: step778
Risks and Security of Internet and Systems

Javier Lopez, Indrajit Ray, Bruno Crispo, "Risks and Security of Internet and Systems"
2015 | pages: 286 | ISBN: 3319171267 | PDF | 18,4 mb

ICT Systems Security and Privacy Protection

Posted By: step778
ICT Systems Security and Privacy Protection

Hannes Federrath, Dieter Gollmann, "ICT Systems Security and Privacy Protection"
2015 | pages: 648 | ISBN: 3319184660 | PDF | 26,4 mb

Routing TCP/IP: Volume 2 (CCIE Professional Development)

Posted By: First1
Routing TCP/IP: Volume 2 (CCIE Professional Development)

Routing TCP/IP: Volume 2 (CCIE Professional Development) by Jeff Doyle, Jennifer DeHaven Carroll
English | 2004 | ISBN: 1578700892, 8131719472 | 501 Pages | EPUB | 42.23 MB

Further your CCIE preparation while mastering advanced TCP/IP concepts The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques.

Routing TCP/IP: Volume 2 (CCIE Professional Development) (Repost)

Posted By: First1
Routing TCP/IP: Volume 2 (CCIE Professional Development) (Repost)

Routing TCP/IP: Volume 2 (CCIE Professional Development) by Jeff Doyle, Jennifer DeHaven Carroll
English | April 21st, 2001 | ISBN: 1578700892, 8131719472 | 968 Pages | PDF | 8.61 MB

Further your CCIE preparation while mastering advanced TCP/IP concepts The complexities of exterior gateway protocols, including TCP connections, message states, path attributes, interior routing protocol interoperation, and setting up neighbor connections, require a comprehensive understanding of router operations in order to manage network growth. Routing TCP/IP, Volume II, provides you with the expertise necessary to understand and implement Border Gateway Protocol Version 4 (BGP-4), multicast routing, Network Address Translation (NAT), IPv6, and effective router management techniques.

CompTIA Security+ SY0-401

Posted By: naag
CompTIA Security+ SY0-401

CompTIA Security+ SY0-401
MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 8 Hours | 13.2 GB
Genre: eLearning | Language: English

Speech and Language Processing for Human-Machine Communications

Posted By: AvaxGenius
Speech and Language Processing for Human-Machine Communications

Speech and Language Processing for Human-Machine Communications: Proceedings of CSI 2015 By S. S. Agrawal
English | PDF | 2017 (2018 Edition) | 223 Pages | ISBN: 9811066256 | 6.12 MB

This volume comprises the select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volumes cover diverse topics ranging from communications networks to big data analytics, and from system architecture to cyber security. This volume focuses on Speech and Language Processing for Human-Machine Communications.