Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Cyber-Risk Management [Repost]

Posted By: ChrisRedfield
Cyber-Risk Management [Repost]

Atle Refsdal, Bjørnar Solhaug, Ketil Stølen - Cyber-Risk Management
Published: 2015-10-01 | ISBN: 3319235699 | PDF | 145 pages | 1.9 MB

"Recent Progress in Parallel and Distributed Computing" ed by Wen-Jyi Hwang

Posted By: exLib
"Recent Progress in Parallel and Distributed Computing" ed by Wen-Jyi Hwang

"Recent Progress in Parallel and Distributed Computing" ed by Wen-Jyi Hwang
ITOe | 2017 | ISBN: 9535133160 9789535133162 | 114 pages | PDF | 5 MB

This volume is dedicated to parallel and distributed computing - one of the most active areas of research in recent years. The techniques involved have found significant applications in areas as diverse as engineering, management, natural sciences, and social sciences. This book reports state-of-the-art topics and advances in this emerging field.

"Security Enhanced Applications for Information Systems" ed. by Christos Kalloniatis

Posted By: exLib
"Security Enhanced Applications for Information Systems" ed. by Christos Kalloniatis

"Security Enhanced Applications for Information Systems" ed. by Christos Kalloniatis
InTeOp | 2012 | ISBN: 9535106430 9789535106432 | 233 pages | PDF | 11 MB

This book aims to present a number of innovative security enhanced applications. The book is a quality guide for teaching purposes as well as for young researchers since it presents leading innovative contributions on security enhanced applications on various Information Systems. It involves cases based on the standalone, network and Cloud environments.

Electronically Stored Information : The Complete Guide to Management, Understanding, Acquisition, Storage, Search

Posted By: readerXXI
Electronically Stored Information : The Complete Guide to Management, Understanding, Acquisition, Storage, Search

Electronically Stored Information : The Complete Guide to Management,
Understanding, Acquisition, Storage, Search, and Retrieval, Second Edition

by David R. Matthews
English | 2016 | ISBN: 149873958X | 310 Pages | PDF | 10 MB

Defensive Security Handbook: Best Practices for Securing Infrastructure

Posted By: viserion
Defensive Security Handbook: Best Practices for Securing Infrastructure

Lee Brotherston, Amanda Berlin, "Defensive Security Handbook: Best Practices for Securing Infrastructure"
ISBN: 1491960388 | 2017 | PDF | 281 pages | 29 MB

Udemy - Java Web Services (Repost)

Posted By: First1
Udemy - Java Web Services (Repost)

Udemy - Java Web Services (Repost)
Size: 5.50 GB | Duration: 12 hrs 39 mns | Video: AVC (.mp4) 1728x1080 59.94fps | Audio: AAC 44KHz 2ch
Genre: eLearning | Language: English | + Article, Supplemental Resources, Quizzes

Learn how to design, create, consume and secure SOAP and REST web services from scratch in easy steps. The last updated (2/2017) is included!

Security of Self-Organizing Networks: MANET, WSN, WMN, VANET [Repost]

Posted By: ChrisRedfield
Security of Self-Organizing Networks: MANET, WSN, WMN, VANET [Repost]

Al-Sakib Khan Pathan - Security of Self-Organizing Networks: MANET, WSN, WMN, VANET
Published: 2010-10-14 | ISBN: 143981919X | PDF | 638 pages | 4.98 MB

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Posted By: AvaxGenius
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center By Marshall Copeland
English | PDF,EPUB | 2017 | 217 Pages | ISBN : 1484227395 | 16.9 MB

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Trustworthy Execution on Mobile Devices [Repost]

Posted By: ChrisRedfield
Trustworthy Execution on Mobile Devices [Repost]

Amit Vasudevan, Jonathan M. McCune, James Newsome - Trustworthy Execution on Mobile Devices
Published: 2013-08-11 | ISBN: 1461481899 | PDF | 85 pages | 1.65 MB

Financial Cryptography and Data Security: FC 2016 International Workshops

Posted By: Jeembo
Financial Cryptography and Data Security: FC 2016 International Workshops

Financial Cryptography and Data Security: FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers by Jeremy Clark, Sarah Meiklejohn, Peter Y.A. Ryan, Dan Wallach, Michael Brenner, Kurt Rohloff
English | 2016 | ISBN: 3662533561 | 343 Pages | PDF | 16.3 MB

This book constitutes the refereed proceedings of three workshops heldat the 20th International Conference on Financial Cryptography and DataSecurity, FC 2016, in Christ Church, Barbados, in February 2016.

Transactions on Computational Science XXVIII: Special Issue on Cyberworlds and Cybersecurity

Posted By: Jeembo
Transactions on Computational Science XXVIII: Special Issue on Cyberworlds and Cybersecurity

Transactions on Computational Science XXVIII: Special Issue on Cyberworlds and Cybersecurity by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin
English | 2016 | ISBN: 3662530899 | 177 Pages | PDF | 58.9 MB

The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innovative approach supporting many other scientific disciplines.

The Decision to Attack : Military and Intelligence Cyber Decision-Making

Posted By: readerXXI
The Decision to Attack : Military and Intelligence Cyber Decision-Making

The Decision to Attack :
Military and Intelligence Cyber Decision-Making

by Aaron Franklin Brantly
English | 2016 | ISBN: 0820349208 | 245 Pages | PDF | 2 MB

The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities [Audiobook]

Posted By: tarantoga
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities [Audiobook]

Domenic Antonucci, Mark Schectman (Narrator), "The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities"
ASIN: B073X6D3VT | 2017 | MP3@64 kbps | ~10:49:00 | 308 MB

Pluralsight - Planning and Designing Microsoft Azure Networking Solutions

Posted By: First1
Pluralsight - Planning and Designing Microsoft Azure Networking Solutions

Pluralsight - Planning and Designing Microsoft Azure Networking Solutions
Size: 235.43 MB | Duration: 2 hrs 19 mins | Video: AVC (.mp4) 1024x768 15fps | Audio: AAC 44KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English | + Exercise files

When using Azure there can be many network considerations and this course will take you through all the networking technologies, and outline when and how to use them so you can deliver the most functional and secure solutions.

Pluralsight - Citrix Networking Deep Dive

Posted By: First1
Pluralsight - Citrix Networking Deep Dive

Pluralsight - Citrix Networking Deep Dive
Size: 116.51 MB | Duration: 1 hr 4 mins | Video: AVC (.mp4) 1024x768 15fps | Audio: AAC 44KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English | + Exercise files

This course will teach you Network, Firewall, Security Admins, and how to understand the unique characteristics of Citrix XenApp/XenDesktop. This course is intended to bridge the gap between CCNA-level knowledge and Citrix technologies.