Subcategories
11.11
And here we are in 2017, we decided to start it out with a few major changes. Some of those changes you might like, while others might not please you as much, but there always has to be a trade-off.

Let us begin with the good news. First of all, we would like to thank all the 100k visitors that come to us every day. Second, we would like to list all the changes that were recently made on our website:

  • The script of our website was completely rewritten and renewed, which made the website more stable and quick.

  • All ads were removed from our website. No more banners, pop-ups and pop-under ads.

  • The website is using SSL protocols as we care greatly about security.

  • The website is available through Tor network (The Onion Router) by using this link: http://avaxhome5lcpcok5.onion/ or via TOR proxy http://avaxhome5lcpcok5.onion.to/

Now, we’d like to mention some of the unpleasant changes that will befall our users. As you might have noticed, we are now using a new file hosting website - IcerBox.com. From this day forward, all files can be downloaded from premium accounts only.

Do you look at life seeing a half-full or a half-empty glass of water? What we’re getting at is that you can look at this change as a mandatory fee for downloading files or you can view it as a crowdfunding of your favorite project!

Cheers to everyone! We hope that you’ll be with us for years to come!

GET STARTED NOW!

CompTIA Security+ All-in-One Exam Guide (repost)

Posted By: viserion
CompTIA Security+ All-in-One Exam Guide (repost)

Gregory White, Wm. Arthur Conklin, Dwayne Williams, Chuck Cothren, Roger L. Davis, "CompTIA Security+ All-in-One Exam Guide (Exam SY0-401), 4th Edition"
ISBN: 0071841245 | 2014 | PDF/EPUB | 704 pages | 21 MB/9 MB

Public Key Infrastructures, Services and Applications

Posted By: tanas.olesya
Public Key Infrastructures, Services and Applications

Public Key Infrastructures, Services and Applications (Security and Cryptology) by Sokratis Katsikas
English | 19 Jan. 2014 | ISBN: 3642539963 | 216 Pages | PDF | 5 MB

The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving,…

Fehlerkorrigierende Codes: Konstruieren, Anwenden, Decodieren

Posted By: arundhati
Fehlerkorrigierende Codes: Konstruieren, Anwenden, Decodieren

Olaf Manz, "Fehlerkorrigierende Codes: Konstruieren, Anwenden, Decodieren"
2017 | German | ISBN-10: 3658146516 | 288 pages | PDF | 5 MB

Complexity and Cryptography [Repost]

Posted By: tanas.olesya
Complexity and Cryptography [Repost]

Complexity and Cryptography: An Introduction by John Talbot
English | 12 Jan. 2006 | ISBN: 0521617715, 0521852315 | 304 Pages | PDF | 3 MB

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes.

The Once and Future Turing: Computing the World

Posted By: Underaglassmoon
The Once and Future Turing: Computing the World

The Once and Future Turing: Computing the World
Cambridge | English | 2016 | ISBN-10: 1107010837 | 395 pages | PDF | 14.78 mb

Editors: S. Barry Cooper, University of Leeds, Andrew Hodges, University of Oxford

Secure Computer and Network Systems: Modeling, Analysis and Design (Repost)

Posted By: elodar
Secure Computer and Network Systems: Modeling, Analysis and Design (Repost)

Nong Ye, "Secure Computer and Network Systems: Modeling, Analysis and Design"
English | 2008-02-26 | ISBN: 0470023244 | 356 pages | PDF | 3.64 mb

Practical Cryptography: Algorithms and Implementations Using C++ (Repost)

Posted By: DZ123
Practical Cryptography: Algorithms and Implementations Using C++ (Repost)

Saiful Azad, Al-Sakib Khan Pathan, "Practical Cryptography: Algorithms and Implementations Using C++"
English | 2014 | ISBN: 1482228890 | PDF | pages: 358 | 2.4 mb

Best Internet Links

Posted By: Alex

Product Design and Development (6th edition) (Repost)

Posted By: insetes
Product Design and Development (6th edition) (Repost)

Product Design and Development (6th edition) By Karl Ulrich, Steven Eppinger
2015 | 448 Pages | ISBN: 0078029066 | PDF | 302 MB

Number-theoretic Algorithms in Cryptography

Posted By: roxul
Number-theoretic Algorithms in Cryptography

O. N. Vasilenko, "Number-theoretic Algorithms in Cryptography"
English | ISBN: 0821840908 | 2007 | 248 pages | PDF | 15 MB

Introduction to Coding Theory, Second Edition

Posted By: ksveta6
Introduction to Coding Theory, Second Edition

Introduction to Coding Theory, Second Edition (Discrete Mathematics and Its Applications) by Jurgen Bierbrauer
2016 | ISBN: 1482299801 | English | 538 pages | PDF | 5 MB

Codebreakers' Victory: How the Allied Cryptographers Won World War II (repost)

Posted By: arundhati
Codebreakers' Victory: How the Allied Cryptographers Won World War II (repost)

Hervie Haufler, "Codebreakers' Victory: How the Allied Cryptographers Won World War II"
ISBN: 1617564044, 0451209796 | 2011 | EPUB | 430 pages | 1 MB

Cryptography Engineering: Design Principles and Practical Applications (repost)

Posted By: viserion
Cryptography Engineering: Design Principles and Practical Applications (repost)

Niels Ferguson, Bruce Schneier, Tadayoshi Kohno, "Cryptography Engineering: Design Principles and Practical Applications"
ISBN: 0470474246 | 2010 | EPUB/PDF | 384 pages | 2 MB/2 MB

Spring: An Anthology for the Changing Seasons

Posted By: Rare-1
Spring: An Anthology for the Changing Seasons

Melissa Harrison, " Spring: An Anthology for the Changing Seasons"
ISBN: 1783962232 | 2016 | EPUB | 208 pages | 2.58 MB

Security and Privacy for Mobile Healthcare Networks (Repost)

Posted By: insetes
Security and Privacy for Mobile Healthcare Networks (Repost)

Security and Privacy for Mobile Healthcare Networks By Kuan Zhang, Xuemin (Sherman) Shen
2015 | 134 Pages | ISBN: 3319247158 | PDF | 3 MB

Abenteuer Kryptologie [Repost]

Posted By: tanas.olesya
Abenteuer Kryptologie  [Repost]

Abenteuer Kryptologie by Reinhard Wobst
German | 2001 | ISBN: 3827318157 | 456 Pages | PDF | 3 MB

Die dritte Auflage des Standardwerks ist wesentlich überarbeitet und aktualisiert worden. Neu ist u.a. der Rijndael-Algorithmus, die DES-Crack-Maschine der EFF, praktisch wirksame Angriffe auf Handy-Authentifizierung, mehr Details zu ECHELON, Überlegungen zur Biometrie etc.