Subcategories

Linux Networking Cookbook

Posted By: readerXXI
Linux Networking Cookbook

Linux Networking Cookbook
by Gregory Boyce
English | 2016 | ISBN: 1785287915 | 152 Pages | ePUB/Mobi | 1.3/2.4 MB

Learning Penetration Testing with Python

Posted By: readerXXI
Learning Penetration Testing with Python

Learning Penetration Testing with Python
by Christopher Duffy
English | 2015 | ISBN: 1785282328 | 314 Pages | True PDF/ePUB/Mobi+Code | 4.7/13/18 MB

Practical Paranoia iOS 11 Security Essentials

Posted By: AlenMiler
Practical Paranoia iOS 11 Security Essentials

Practical Paranoia iOS 11 Security Essentials by Marc Mintz
English | Sep. 23, 2017 | ASIN: B075VBSXDQ | ISBN: 1977564879 | 518 Pages | PDF | 90.48 MB

Rise of the Vulcans: The History of Bush's War Cabinet

Posted By: First1
Rise of the Vulcans: The History of Bush's War Cabinet

Rise of the Vulcans: The History of Bush's War Cabinet by James Mann
English | September 7th, 2004 | ASIN: B002DYMB4Y, ISBN: 0670032999, 0143034898 | 428 pages | EPUB | 0.48 MB

When George W. Bush campaigned for the White House, he was such a novice in foreign policy that he couldn't name the president of Pakistan and momentarily suggested he thought the Taliban was a rock-and-roll band. But he relied upon a group called the Vulcans—an inner circle of advisers with a long, shared experience in government, dating back to the Nixon, Ford, Reagan and first Bush administrations. After returning to power in 2001, the Vulcans were widely expected to restore U.S. foreign policy to what it had been under George H. W. Bush and previous Republican administrations.

Ethical Hacking Course: Introducing Kali linux Hacking Tools

Posted By: naag
Ethical Hacking Course: Introducing Kali linux Hacking Tools

Ethical Hacking Course: Introducing Kali linux Hacking Tools
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 7 | 334 MB
Genre: eLearning | Language: English

Ethical Hacking , Cyber Security , Kali linux , Web Penetration testing , Bug Bounty , CISSP , metasploit , Wireshark

Introduction to Network Security

Posted By: naag
Introduction to Network Security

Introduction to Network Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 27M | 68 MB
Genre: eLearning | Language: English

Testing Software and Systems

Posted By: AvaxGenius
Testing Software and Systems

Testing Software and Systems: 29th IFIP WG 6.1 International Conference, ICTSS 2017, St. Petersburg, Russia, October 9-11, 2017, Proceedings By Nina Yevtushenko, Ana Rosa Cavalli, Hüsnü Yenigün
English | PDF | 2017 | 344 Pages | ISBN : 3319675486 | 13.82 MB

This book constitutes the refereed proceedings of the 29th IFIP WG 6.1 International Conference on Testing Software and Systems ICTSS 2017, held in St. Petersburg, Russia, in October 2017.

Linux Server Security: Hack and Defend

Posted By: First1
Linux Server Security: Hack and Defend

Linux Server Security: Hack and Defend by Chris Binnie
English | May 3rd, 2016 | ASIN: B01F69YSFW, ISBN: 1119277655 | 130 pages | EPUB | 1.73 MB

Learn how to attack and defend the world's most popular web server platform!

Learning iOS Penetration Testing

Posted By: readerXXI
Learning iOS Penetration Testing

Learning iOS Penetration Testing
by Swaroop Yermalkar
English | 2016 | ISBN: 1785883259 | 201 Pages | True PDF | 12 MB

Ethical Hacking , Cyber Security Complete Hacking Course

Posted By: naag
Ethical Hacking , Cyber Security Complete Hacking Course

Ethical Hacking , Cyber Security Complete Hacking Course
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 7 | 328 MB
Genre: eLearning | Language: English

ethical hacking, cyber security ,web penetration testing, Network testing and wifi hacking using kali linux

Online Business Security Systems (Repost)

Posted By: AvaxGenius
Online Business Security Systems (Repost)

Online Business Security Systems By Godfried B. Williams
English | PDF | 2007 | 231 Pages | ISBN : 0387357718 | 3.28 MB

It is common practice for online businesses to implement security systems as part of infrastructure that drive their business processes. The irony is that, implementation of online business security systems do not take into account the global nature of business operations, security risk factors associated with infrastructure type, its location, levels of standards and best practice upheld in managing online systems, skill set of technical and non-technical manpower, socio-cultural and economic dependencies as well as synergistic relationship of these factors.

A Practical Guide to Computer Forensics Investigations

Posted By: arundhati
A Practical Guide to Computer Forensics Investigations

Darren R. Hayes, "A Practical Guide to Computer Forensics Investigations"
2014 | ISBN-10: 0789741156 | 600 pages | PDF | 15 MB

Ethical Hacking and Cyber security Course Hacking Approach

Posted By: naag
Ethical Hacking and Cyber security Course  Hacking Approach

Ethical Hacking and Cyber security Course Hacking Approach
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 7 | 309 MB
Genre: eLearning | Language: English

Ethical Hacking , Cyber Security , Kali linux , Web Penetration testing , Bug Bounty , CISSP , metasploit , Wireshark

Versteckte Botschaften (TELEPOLIS): Die faszinierende Geschichte der Steganografie

Posted By: AlenMiler
Versteckte Botschaften (TELEPOLIS): Die faszinierende Geschichte der Steganografie

Versteckte Botschaften (TELEPOLIS): Die faszinierende Geschichte der Steganografie by Klaus Schmeh
German | 18 Sept. 2017 | ISBN: 395788103X | ASIN: B075R8ZD6Z | 318 Pages | AZW3 | 9.03 MB

IT-Prüfung, Sicherheitsaudit und Datenschutzmodell: Neue Ansätze für die IT-Revision

Posted By: hill0
IT-Prüfung, Sicherheitsaudit und Datenschutzmodell: Neue Ansätze für die IT-Revision

IT-Prüfung, Sicherheitsaudit und Datenschutzmodell: Neue Ansätze für die IT-Revision by Aleksandra Sowa
German | 6 Sept. 2017 | ISBN: 3658174684 | 224 Pages | PDF | 3.42 MB

Das Buch erläutert leicht verständlich die modernen Grundlagen der Revisionsarbeit. Erstmalig für praktische Anwendung systematisiert, führt es in Systeme der Security Intelligence, kognitiven Sicherheit und Schwarmintelligenz ein.