Subcategories

Bug Bounty: Android Hacking (Updated)

Posted By: Sigha
Bug Bounty: Android Hacking (Updated)

Bug Bounty: Android Hacking (Updated)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 632 MB
Genre: eLearning Video | Duration: 59 lectures (2h 42m) | Language: English

Earn by hacking legally

Handbook of Data Compression (Repost)

Posted By: AvaxGenius
Handbook of Data Compression (Repost)

Handbook of Data Compression by David Salomon
English | PDF | 2010 | 1370 Pages | ISBN : 1848829027 | 16.57 MB

"A wonderful treasure chest of information; spanning a wide range of data compression methods, from simple text compression methods to the use of wavelets in image compression. It is unusual for a text on compression to cover the field so completely." – ACM Computing Reviews.

Information Systems Development: Towards a Service Provision Society (Repost)

Posted By: AvaxGenius
Information Systems Development: Towards a Service Provision Society (Repost)

Information Systems Development: Towards a Service Provision Society by George Angelos Papadopoulos
English | PDF,EPUB | 2009 | 964 Pages | ISBN : 0387848096 | 33.8 MB

Information Systems Development: Towards a Service Provision Society is the collected proceedings of the Seventeenth International Conference on Information Systems Development: Towards a Service Provision Society – ISD 2008 Conference, held in Paphos, Cyprus. It follows in the tradition of previous conferences in the series in exploring the connections between industry, research and education.

Association Rule Hiding for Data Mining (Repost)

Posted By: AvaxGenius
Association Rule Hiding for Data Mining (Repost)

Association Rule Hiding for Data Mining by Aris Gkoulalas-Divanis
English | PDF | 2010 | 159 Pages | ISBN : 1441965688 | 2.7 MB

Privacy and security risks arising from the application of different data mining techniques to large institutional data repositories have been solely investigated by a new research domain, the so-called privacy preserving data mining. Association rule hiding is a new technique on data mining, which studies the problem of hiding sensitive association rules from within the data.

Privacy Preserving Data Mining (Repost)

Posted By: AvaxGenius
Privacy Preserving Data Mining (Repost)

Privacy Preserving Data Mining by Jaideep Vaidya
English | PDF | 2006 | 124 Pages | ISBN : 0387258868 | 6.46 MB

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense.

Privacy-Preserving Data Mining: Models and Algorithms (Repost)

Posted By: AvaxGenius
Privacy-Preserving Data Mining: Models and Algorithms (Repost)

Privacy-Preserving Data Mining: Models and Algorithms by Charu C. Aggarwal
English | PDF | 2008 | 524 Pages | ISBN : 0387709916 | 6.01 MB

Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals. This has caused concerns that personal data may be used for a variety of intrusive or malicious purposes.

Data Mining and Knowledge Discovery with Evolutionary Algorithms (Repost)

Posted By: AvaxGenius
Data Mining and Knowledge Discovery with Evolutionary Algorithms (Repost)

Data Mining and Knowledge Discovery with Evolutionary Algorithms by Alex A. Freitas
English | PDF | 2002 | 272 Pages | ISBN : 3540433317 | 27.71 MB

This book integrates two areas of computer science, namely data mining and evolutionary algorithms. Both these areas have become increasingly popular in the last few years, and their integration is currently an area of active research. In general, data mining consists of extracting knowledge from data. In this book we particularly emphasize the importance of discovering comprehensible and interesting knowledge, which is potentially useful to the reader for intelligent decision making.

Whistleblowers, Leakers, and Their Networks : From Snowden to Samizdat

Posted By: readerXXI
Whistleblowers, Leakers, and Their Networks : From Snowden to Samizdat

Whistleblowers, Leakers, and Their Networks : From Snowden to Samizdat
by Jason Ross Arnold
English | 2020 | ISBN: 1538130564 | 219 Pages | PDF | 3.21 MB

Intelligence and Intelligence Analysis (Repost)

Posted By: step778
Intelligence and Intelligence Analysis (Repost)

Patrick F. Walsh, "Intelligence and Intelligence Analysis"
2011 | pages: 353 | ISBN: 1843927381 | PDF | 1,3 mb

Coordination, Organizations, Institutions, and Norms in Agent Systems XII (Repost)

Posted By: step778
Coordination, Organizations, Institutions, and Norms in Agent Systems XII (Repost)

Stephen Cranefield, Samhar Mahmoud, Julian Padget, "Coordination, Organizations, Institutions, and Norms in Agent Systems XII"
2017 | pages: 179 | ISBN: 3319665944 | PDF | 11,6 mb

Joining the United States Navy: A Handbook (Joining the Military)

Posted By: tanas.olesya
Joining the United States Navy: A Handbook (Joining the Military)

Joining the United States Navy: A Handbook (Joining the Military) by Snow Wildsmith
English | May 9, 2012 | ISBN: 0786447621 | 233 pages | PDF | 9.86 Mb

Data Warehousing and Data Mining Techniques for Cyber Security (Repost)

Posted By: AvaxGenius
Data Warehousing and Data Mining Techniques for Cyber Security (Repost)

Data Warehousing and Data Mining Techniques for Cyber Security by Anoop Singhal
English | PDF | 2007 | 166 Pages | ISBN : 0387264094 | 7.55 MB

Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend–without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important.

Trust & Fault in Multi Layered Cloud Computing Architecture

Posted By: AvaxGenius
Trust & Fault in Multi Layered Cloud Computing Architecture

Trust & Fault in Multi Layered Cloud Computing Architecture by Punit Gupta
English | PDF | 2020 | 226 Pages | ISBN : 3030373185 | 10.22 MB

This book discusses various aspects of cloud computing, in which trust and fault-tolerance models are included in a multilayered, cloud architecture. The authors present a variety of trust and fault models used in the cloud, comparing them based on their functionality and the layer in the cloud to which they respond. Various methods are discussed that can improve the performance of cloud architectures, in terms of trust and fault-tolerance, while providing better performance and quality of service to user.

How To Secure Your WordPress Site & Protect Files Safely

Posted By: Sigha
How To Secure Your WordPress Site & Protect Files Safely

How To Secure Your WordPress Site & Protect Files Safely
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 378 MB
Genre: eLearning Video | Duration: 20 lectures (55m) | Language: English

Discover How to Secure Your Valuable WordPress Site and Protect Your Files..Even If You Know Nothing About Security.

Cybersecurity in France (Repost)

Posted By: DZ123
Cybersecurity in France (Repost)

Philippe Baumard, "Cybersecurity in France"
English | 2017 | ISBN: 3319543067 | PDF | pages: 113 | 2.3 mb