Subcategories

Hacking: The Art of Exploitation, 2nd Edition

Posted By: igor_lv
Hacking: The Art of Exploitation, 2nd Edition

Hacking by Jon Erickson
English | 2008 | ISBN: 1593271441 | 2nd Edition | MOBI, EPUB | 400 pages | 8 Mb
Security

A security professional's paradise for different loopholes and explaining the underlying logic behind the attacks.

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Posted By: hill0
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time

Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
by O Sami Saydjari

English | 2018 | ISBN: 1260118177 | 592 Pages | EPUB | 37 MB

The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling [Part Two]

Posted By: naag
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling [Part Two]

The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3.5 Hours | 4.94 GB
Genre: eLearning | Language: English

Dynamic Secrets in Communication Security

Posted By: DZ123
Dynamic Secrets in Communication Security

Sheng Xiao, Weibo Gong, Don Towsley, "Dynamic Secrets in Communication Security"
English | 2013 | ISBN: 1461478308 | PDF | pages: 137 | 2.2 mb

Advanced Malware Protection

Posted By: IrGens
Advanced Malware Protection

Advanced Malware Protection
.TS, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 1h 42m | 384 MB
Instructor: Piotr Kaluzny

Securing Java Web Application Data

Posted By: IrGens
Securing Java Web Application Data

Securing Java Web Application Data
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 41m | 486 MB
Instructor: Josh Cummings

Configuring Microsoft Azure Active Directory Privileged Identity Management

Posted By: IrGens
Configuring Microsoft Azure Active Directory Privileged Identity Management

Configuring Microsoft Azure Active Directory Privileged Identity Management
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 30m | 200 MB
Instructor: Tim Warner

AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

Posted By: First1
AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam by Ben Piper, David Clinton
English | July 2nd, 2019 | ISBN: 1119490707 | 307 pages | True PDF | 11.83 MB

Set yourself apart by becoming an AWS Certified Cloud Practitioner

System Security Plan (SSP) for NIST 800-171 Compliance

Posted By: naag
System Security Plan (SSP) for NIST 800-171 Compliance

System Security Plan (SSP) for NIST 800-171 Compliance
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 36M | Lec: 5 | 541 MB
Genre: eLearning | Language: English

Real-World Bug Hunting: A Field Guide to Web Hacking

Posted By: tarantoga
Real-World Bug Hunting: A Field Guide to Web Hacking

Peter Yaworski, "Real-World Bug Hunting: A Field Guide to Web Hacking"
ISBN: 1593278616 | 2019 | EPUB | 264 pages | 4 MB

Securing Windows Server 2019

Posted By: IrGens
Securing Windows Server 2019

Securing Windows Server 2019
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 35m | 201 MB
Instructor: Ed Liberman

Incident Response Planning

Posted By: IrGens
Incident Response Planning

Incident Response Planning
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 55m | 534 MB
Instructor: Jason Dion

Transmission Line Protection Using Digital Technology (Energy Systems in Electrical Engineering) [Repost]

Posted By: tanas.olesya
Transmission Line Protection Using Digital Technology (Energy Systems in Electrical Engineering) [Repost]

Transmission Line Protection Using Digital Technology (Energy Systems in Electrical Engineering) by Vijay H. Makwana, Bhavesh R. Bhalja
English | July 23, 2016 | ISBN: 9811015716 | 167 pages | PDF | 4.15 Mb

The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling

Posted By: naag
The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling

The Complete Cybersecurity Bootcamp (Video Collection): Threat Defense, Ethical Hacking, and Incident Handling
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 22.5 Hours | 29.1 GB
Genre: eLearning | Language: English

Ethical Hacking using Kali Linux from A to Z Course

Posted By: Sigha
Ethical Hacking using Kali Linux from A to Z Course

Ethical Hacking using Kali Linux from A to Z Course
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 5.4 GB
Duration: 8.5 hours | Genre: eLearning Video | Language: English

Learn Ethical Hacking using Kali from Scratch