Subcategories

Security and Cryptography for Networks

Posted By: DZ123
Security and Cryptography for Networks

Michel Abdalla, De Prisco, Roberto, "Security and Cryptography for Networks"
English | 2014 | ISBN: 3319108786 | PDF | pages: 625 | 8.9 mb

Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications

Posted By: DZ123
Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications

Feng Liu, Wei Qi Yan, "Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications"
English | 2014 | ISBN: 3319096435 | PDF | pages: 154 | 5.4 mb

Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin A

Posted By: arundhati
Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin A

Peter Schwabe, "Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin A"
English | ISBN: 3030305295 | 2019 | 385 pages | PDF | 9 MB

Visionary Servant Leadership

Posted By: Sigha
Visionary Servant Leadership

Visionary Servant Leadership
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 1.81 GB
Duration: 1.5 hours | Genre: eLearning | Language: English

Becoming the best leader you can be in the workplace, at home and in the community

Votre application Android en Reskin & Reverse Engineering

Posted By: Sigha
Votre application Android en Reskin & Reverse Engineering

Votre application Android en Reskin & Reverse Engineering
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 285 MB
Duration: 1.5 hours | Genre: eLearning | Language: Français

Créer votre première application pour Android sans programmation tout en utilisant le Reskin et le Reverse Engineering.

OSER LE POIDS IDEAL : Le Cours Intensif Anti-Obésité

Posted By: Sigha
OSER LE POIDS IDEAL : Le Cours Intensif Anti-Obésité

OSER LE POIDS IDEAL : Le Cours Intensif Anti-Obésité
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 700 MB
Duration: 31 mins | Genre: eLearning | Language: Français

Un cours intensif de 30 minutes pour comprendre la biochimie de la prise de poids et les moyens de la vaincre.

Advance Web Hacking : Penetration Testing & Bug Bounty | AWH (Updated)

Posted By: Sigha
Advance Web Hacking : Penetration Testing & Bug Bounty | AWH (Updated)

Advance Web Hacking : Penetration Testing & Bug Bounty | AWH (Updated)
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 1.55 GB
Duration: 2.5 hours | Genre: eLearning | Language: English

Learn How To Perform A Penetration Test From Scratch On A Live Website and Make A Report To Get Your First Job Easily.

Learning Kali Linux : Security Testing, Penetration Testing, and Ethical Hacking

Posted By: readerXXI
Learning Kali Linux : Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux : Security Testing, Penetration Testing, and Ethical Hacking
by Ric Messier
English | 2018 | ISBN: 149202869X | 402 Pages | PDF | 22 MB

Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography

Posted By: interes
Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography

Abstract Algebra: Applications to Galois Theory, Algebraic Geometry and Cryptography by Gerhard Rosenberger and Benjamin Fine
English | 2011-01-28 | ISBN: 311025008X | PDF | 366 pages | 1,6 MB

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

Posted By: First1
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World by Marcus J. Carey, Jennifer Jin
English | August 3rd, 2019 | ISBN: 1119643376 | 400 pages | EPUB | 4.74 MB

Looking for real-world advice from leading cybersecurity experts? You’ve found your tribe.

Advances in Cryptology – CRYPTO 2013, Part II

Posted By: DZ123
Advances in Cryptology – CRYPTO 2013, Part II

Ran Canetti, Juan A. Garay, "Advances in Cryptology – CRYPTO 2013, Part II"
English | 2013 | ISBN: 3642400833 | PDF | pages: 570 | 5.7 mb

Advances in Cryptology – CRYPTO 2013, Part I

Posted By: DZ123
Advances in Cryptology – CRYPTO 2013, Part I

Ran Canetti, Juan A. Garay, "Advances in Cryptology – CRYPTO 2013, Part I"
English | 2013 | ISBN: 364240040X | PDF | pages: 605 | 9.0 mb

Public-Key Cryptography -- PKC 2014 (Repost)

Posted By: DZ123
Public-Key Cryptography -- PKC 2014 (Repost)

Hugo Krawczyk, "Public-Key Cryptography – PKC 2014"
English | 2014 | ISBN: 3642546307 | PDF | pages: 699 | 8.1 mb

Compression-Based Methods of Statistical Analysis and Prediction of Time Series [Repost]

Posted By: tanas.olesya
Compression-Based Methods of Statistical Analysis and Prediction of Time Series [Repost]

Compression-Based Methods of Statistical Analysis and Prediction of Time Series by Boris Ryabko, Jaakko Astola, Mikhail Malyutov
English | May 20, 2016 | ISBN: 3319322516 | 144 pages | PDF | 2.51 Mb

Cryptography and Public Key Infrastructure on the Internet (Repost)

Posted By: DZ123
Cryptography and Public Key Infrastructure on the Internet (Repost)

Klaus Schmeh, "Cryptography and Public Key Infrastructure on the Internet"
English | 2003 | ISBN: 047084745X | PDF | pages: 490 | 12.0 mb