Subcategories

Privacy Protection and Computer Forensics, Second Edition (Repost)

Posted By: step778
Privacy Protection and Computer Forensics, Second Edition (Repost)

Michael A. Caloyannides, "Privacy Protection and Computer Forensics, Second Edition"
2004 | pages: 366 | ISBN: 1580538304 | PDF | 4,0 mb

The Social Engineer's Playbook: A Practical Guide to Pretexting

Posted By: First1
The Social Engineer's Playbook: A Practical Guide to Pretexting

The Social Engineer's Playbook: A Practical Guide to Pretexting by Jeremiah Talamantes
English | December 1st, 2014 | ISBN: 0692306617 | 200 pages | AZW3 | 3.97 MB

The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers and Security Analysts. Build effective social engineering plans using the techniques, tools and expert guidance in this book. Learn valuable elicitation techniques, such as: Bracketing, Artificial Ignorance, Flattery, Sounding Board and others.

The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide

Posted By: AlenMiler
The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide

The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide by Don R. Crawley
English | October 6, 2012 | ASIN: B009MT1VS0 | 358 pages | MOBI | 28 MB

Kalkül versus Katastrophe: Die Kommunikation des Klimawandels

Posted By: tanas.olesya
Kalkül versus Katastrophe: Die Kommunikation des Klimawandels

Kalkül versus Katastrophe: Die Kommunikation des Klimawandels von Friedemann Lembcke
Deutsch | 18. Juli 2012 | ISBN: 3531196286 | 159 Seiten | PDF | 1.21 MB

Improving Access to and Confidentiality of Research Data: Report of a Workshop

Posted By: AlexGolova
Improving Access to and Confidentiality of Research Data: Report of a Workshop

Improving Access to and Confidentiality of Research Data: Report of a Workshop by Committee on National Statistics (Author), Commission on Behavioral and Social Sciences and Education (Author), & 5 more
English | 11 Aug. 2000 | ISBN: 0309071801 | 74 pages | PDF | 0.37 MB

Advanced Studies in Biometrics (Repost)

Posted By: step778
Advanced Studies in Biometrics (Repost)

Massimo Tistarelli, Josef Bigun, Enrico Grosso, "Advanced Studies in Biometrics"
2005 | pages: 165 | ISBN: 3540262040 | PDF | 6,6 mb

PCI DSS: The State of Cardholder Data Attacks

Posted By: naag
PCI DSS: The State of Cardholder Data Attacks

PCI DSS: The State of Cardholder Data Attacks
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 985 MB
Genre: eLearning | Language: English

Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018

Posted By: roxul
Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018

Renault, Éric and Selma Boumerdassi, "Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018"
English | ISBN: 3030031004 | 2019 | 354 pages | PDF, EPUB | 66 MB

Selected Areas in Cryptography - SAC 2018

Posted By: arundhati
Selected Areas in Cryptography - SAC 2018

Carlos Cid, Michael J. Jacobson Jr., "Selected Areas in Cryptography - SAC 2018: 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers"
2019 | ISBN-10: 3030109690 | 512 pages | PDF, EPUB | 47 MB

Content Delivery Networks: Web Switching for Security, Availability, and Speed

Posted By: DZ123
Content Delivery Networks: Web Switching for Security, Availability, and Speed

Scot Hull, "Content Delivery Networks: Web Switching for Security, Availability, and Speed"
English | 2002 | ISBN: 0072190469 | PDF | pages: 472 | 13.1 mb

Advanced Ethical Hacking Course For 2019

Posted By: Sigha
Advanced Ethical Hacking Course For 2019

Advanced Ethical Hacking Course For 2019
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 1.15 GB
Duration: 4 hours | Genre: eLearning | Language: English

Simply The Best Place To Gain Advanced Knowledge Of Ethical Hacking

The Complete Wireshark Course 2019

Posted By: Sigha
The Complete Wireshark Course 2019

The Complete Wireshark Course 2019
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 1.43 GB
Duration: 4 hours | Genre: eLearning | Language: English

Simply the best place to learn A to Z about Wireshark. Go from beginner to advanced

Advances in Cryptology - ASIACRYPT 2015

Posted By: tanas.olesya
Advances in Cryptology - ASIACRYPT 2015

Advances in Cryptology - ASIACRYPT 2015 (Security and Cryptology) by Tetsu Iwata
English | 6 Feb. 2016 | ISBN: 3662487993 | 809 Pages | PDF | 20.21 MB

Active Defense: A Comprehensive Guide to Network Security (Repost)

Posted By: step778
Active Defense: A Comprehensive Guide to Network Security (Repost)

Cameron Hunt, "Active Defense: A Comprehensive Guide to Network Security"
2001 | pages: 374 | ISBN: 0782129161 | PDF | 6,3 mb

Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology

Posted By: First1
Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology

Raising Humans in a Digital World: Helping Kids Build a Healthy Relationship with Technology by Diana Graber
English | January 15th, 2019 | ISBN: 0814439799 | 255 pages | EPUB | 0.52 MB

Sexting, cyberbullying, revenge porn, online predators… all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children’s hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology’s many benefits and opportunities.