Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Posted By: AvaxGenius
Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center By Marshall Copeland
English | PDF,EPUB | 2017 | 217 Pages | ISBN : 1484227395 | 16.9 MB

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Take Control of the Cloud, Second Edition

Posted By: First1
Take Control of the Cloud, Second Edition

Take Control of the Cloud, Second Edition by Joe Kissell
English | July 15th, 2017 | ISBN: 9781947282032 | 144 pages | EPUB/MOBI/True PDF | 5.72 MB

Cut through the hype, understand cloud services, and enhance your privacy and security!

Udemy - Practice Nmap, Metasploit and Kali for Your First Pentest!

Posted By: First1
Udemy - Practice Nmap, Metasploit and Kali for Your First Pentest!

Udemy - Practice Nmap, Metasploit and Kali for Your First Pentest!
Size: 1.23 GB | Duration: 2 hrs 47 mns | Video: AVC (.mp4) 1920x1080 30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | + Articles, Quizzes

Learn ethical hacking with Kali in your own lab, scan targets with Nmap and exploit victims with metasploit!

The Palgrave Handbook of Security, Risk and Intelligence

Posted By: AvaxGenius
The Palgrave Handbook of Security, Risk and Intelligence

The Palgrave Handbook of Security, Risk and Intelligence By Robert Dover, Huw Dylan, Michael S. Goodman
English | PDF | 2017 | 494 Pages | ISBN : 1137536748 | 8 MB

This handbook provides a detailed analysis of threats and risk in the international system and of how governments and their intelligence services must adapt and function in order to manage the evolving security environment. This environment, now and for the foreseeable future, is characterised by complexity.

Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security

Posted By: AvaxGenius
Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security

Proceedings of the 2nd Workshop on Communication Security: Cryptography and Physical Layer Security By Marco Baldi Elizabeth A. Quaglia Stefano Tomasin
English | PDF | 2018 | 150 Pages | ISBN : 3319592645 | 3.2 MB

This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers.

Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell [Repost]

Posted By: ChrisRedfield
Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell [Repost]

Phil Lapsley - Exploding the Phone: The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell
Published: 2013-02-05 | ISBN: 080212061X, 0802122280 | EPUB | 416 pages | 1.86 MB

The Browser Hacker's Handbook (repost)

Posted By: roxul
The Browser Hacker's Handbook (repost)

Wade Alcorn, Christian Frichot, "The Browser Hacker's Handbook"
2014 | ISBN-10: 1118662091 | 648 pages | EPUB, MOBI, PDF | 92 MB

The Darkening Web: The War for Cyberspace [Audiobook]

Posted By: tarantoga
The Darkening Web: The War for Cyberspace [Audiobook]

Alexander Klimburg, Kaleo Griffith (Narrator), "The Darkening Web: The War for Cyberspace"
ASIN: B071J8RTXR | 2017 | MP3@64 kbps | ~14:59:00 | 425 MB

How to Hack Whats App Account

Posted By: naag
How to Hack Whats App Account

How to Hack Whats App Account
English | 2017 | ASIN: B073S5QV5V | 34 pages | AZW3/PDF/EPUB (conv) | 1.96 Mb

Whatsapp is a very common name for those who uses a smartphone. Almost everyone has this app installed in their smartphones and they make use of this app to the fullest.

Udemy - Learn Social Engineering From Scratch

Posted By: First1
Udemy - Learn Social Engineering From Scratch

Udemy - Learn Social Engineering From Scratch
Size: 1.62 GB | Duration: 12 hours | Video: AVC (.mp4) 1280x720 29.97fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | + Supplemental Resources, Article

Learn how to hack into secure systems like a real hacker & how to secure yourself from hackers.

Kali Linux 2: Windows Penetration Testing

Posted By: First1
Kali Linux 2: Windows Penetration Testing

Kali Linux 2: Windows Penetration Testing by Wolf Halton, Bo Weaver
English | June 28th, 2016 | ASIN: B013GKGL94, ISBN: 1782168494 | 422 pages | AZW3 | 31.31 MB

If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial.

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions (Repost)

Posted By: nebulae
Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions (Repost)

Slava Gomzin, "Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions"
English | ISBN: 1118810112 | 2014 | 312 pages | PDF | 23 MB

Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

Posted By: hill0
Think Like a Hacker: A Sysadmin's Guide to Cybersecurity

Think Like a Hacker: A Sysadmin's Guide to Cybersecurity by Michael Melone
English | 28 Jun. 2017 | ASIN: B073H61FKN | 99 Pages | AZW3 | 368.64 KB

Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.

Penetration Testing: A Survival Guide

Posted By: readerXXI
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide
by Wolf Halton and Bo Weaver
English | 2016 | ISBN: 1787289885 | 1045 Pages | True PDF | 53 MB

Practical SVG

Posted By: lengen
Practical SVG

Practical SVG by Chris Coyier
English | 2016 | ISBN: 193755743X | 161 Pages | PDF | 7 MB

RA RE LY, IF E V E R, has a web project of mine been completed without Chris Coyier’s help. Not in person of course, but through the expansive resource that is CSS-tricks.com. Whether I was scouring Google in a panic mere hours before a deadline, or casually trying to remember how exactly those @#$%&! CSS columns work, Chris and CSS Tricks were always there for me.