Subcategories

CISSP For Dummies (For Dummies (Computer/tech)), 6th Edition

Posted By: First1
CISSP For Dummies (For Dummies (Computer/tech)), 6th Edition

CISSP For Dummies (For Dummies (Computer/tech)), 6th Edition by Lawrence C. Miller, Peter H. Gregory
English | June 13th, 2018 | ISBN: 111950581X | 560 Pages | EPUB | 3.10 MB

Secure your CISSP certification!

Intelligence-Driven Incident Response: Outwitting the Adversary

Posted By: First1
Intelligence-Driven Incident Response: Outwitting the Adversary

Intelligence-Driven Incident Response: Outwitting the Adversary by Scott J. Roberts, Kyle R. Maxwell, Rebekah Brown
English | September 9th, 2017 | ISBN: 1491934948 | 282 Pages | True PDF | 7.56 MB

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you’ll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process.

Security, Privacy, and Applied Cryptography Engineering

Posted By: step778
Security, Privacy, and Applied Cryptography Engineering

Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth, "Security, Privacy, and Applied Cryptography Engineering"
2015 | pages: 390 | ISBN: 3319241257 | PDF | 10,6 mb

Cryptography: A Very Short Introduction (Very Short Introductions)

Posted By: First1
Cryptography: A Very Short Introduction (Very Short Introductions)

Cryptography: A Very Short Introduction (Very Short Introductions) by Sean Murphy, Fred Piper
English | May 30th, 2002 | ISBN: 0192803158 | 155 Pages | EPUB | 3.19 MB

This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce.

CompTIA Security+ Practice Tests: Exam SY0-501

Posted By: First1
CompTIA Security+ Practice Tests: Exam SY0-501

CompTIA Security+ Practice Tests: Exam SY0-501 by S. Russell Christy, Chuck Easttom
English | May 8th, 2018 | ISBN: 1119416922 | 456 Pages | EPUB | 0.99 MB

1,000 Challenging practice questions for Exam SY0-501

Cryptography and Information Security in the Balkans

Posted By: step778
Cryptography and Information Security in the Balkans

Berna Ors, Bart Preneel, "Cryptography and Information Security in the Balkans"
2015 | pages: 254 | ISBN: 3319213555 | PDF | 7,0 mb

CompTIA Security+ Practice Tests: Exam SY0-501

Posted By: First1
CompTIA Security+ Practice Tests: Exam SY0-501

CompTIA Security+ Practice Tests: Exam SY0-501 by S. Russell Christy, Chuck Easttom
English | May 8th, 2018 | ISBN: 1119416922, 9781119416920 | 459 Pages | True PDF | 3.47 MB

1,000 Challenging practice questions for Exam SY0-501

Cryptography: A Very Short Introduction (Repost)

Posted By: DZ123
Cryptography: A Very Short Introduction (Repost)

Fred Piper, Sean Murphy, "Cryptography: A Very Short Introduction"
English | 2002 | ISBN: 0192803158 | PDF | pages: 115 | 3.0 mb

Algorithmic Strategies for Solving Complex Problems in Cryptography

Posted By: Underaglassmoon
Algorithmic Strategies for Solving Complex Problems in Cryptography

Algorithmic Strategies for Solving Complex Problems in Cryptography
IGI Global | English | 2018 | ISBN-10: 1522529152 | 302 pages | PDF, EPUB | 2.74 + 11.00 MB

by Kannan Balasubramanian (Author, Editor), M. Rajakani (Editor)

Blockchain: Understanding the Technology of Bitcoin and Cryptocurrency

Posted By: AlexGolova
Blockchain: Understanding the Technology of Bitcoin and Cryptocurrency

Blockchain: Understanding the Technology of Bitcoin and Cryptocurrency by Branden Lee
English | 2 Mar. 2018 | ISBN: 1980443564 | 154 Pages | AZW3 | 380.73 KB

SAP HANA Security Guide (SAP PRESS)

Posted By: First1
SAP HANA Security Guide (SAP PRESS)

SAP HANA Security Guide (SAP PRESS) by Jonathan Haun
English | June 30th, 2017 | ISBN: 1493214411 | 542 Pages | EPUB | 14.74 MB

How do you protect and defend your SAP HANA database and application development platform? This comprehensive guide details your options, including privileges, encryption, and more. Learn how to secure database objects, provision and maintain user accounts, and develop and assign roles. Then take an in-depth look at authentication and certificate management before seeing how to enable auditing and security tracing. Up to date for SAP HANA 2.0!

RSA and Public-Key Cryptography (Repost)

Posted By: step778
RSA and Public-Key Cryptography (Repost)

Richard A. Mollin, "RSA and Public-Key Cryptography"
2002 | pages: 275 | ISBN: 1584883383 | PDF | 1,3 mb

Practical Cyber Intelligence

Posted By: igor_lv
Practical Cyber Intelligence

Practical Cyber Intelligence by Wilson Bautista Jr.
English | 2018 | ISBN: 1788625560 | EPUB | 316 pages | 40 Mb
Cybernetics, Encryption

Serious Cryptography: A Practical Introduction to Modern Encryption

Posted By: viserion
Serious Cryptography: A Practical Introduction to Modern Encryption

Jean-Philippe Aumasson, "Serious Cryptography: A Practical Introduction to Modern Encryption"
ISBN: 1593278268 | 2017 | True PDF | 312 pages | 5 MB

Why Cryptography Should Not Rely on Physical Attack Complexity

Posted By: arundhati
Why Cryptography Should Not Rely on Physical Attack Complexity

Juliane Krämer, "Why Cryptography Should Not Rely on Physical Attack Complexity"
2015 | ISBN-10: 981287786X | 122 pages | EPUB | 2 MB