Subcategories

Introduction to Cryptography

Posted By: Sigha
Introduction to Cryptography

Introduction to Cryptography
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 316 MB
Duration: 1 hours | Genre: eLearning | Language: English

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: hill0
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 456 Pages | MOBI | 61 MB

Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition

Posted By: First1
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition

Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition by Sakis Kasampalis
English | August 31st, 2018 | ISBN: 1788837487 | 248 Pages | EPUB | 1.77 MB

Exploit various design patterns to master the art of solving problems using Python

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: First1
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 449 Pages | True PDF | 25.61 MB

With industries expanding, cyber attacks have increased significantly. Understanding your control system s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols.

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: First1
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 456 Pages | EPUB | 24.91 MB

With industries expanding, cyber attacks have increased significantly. Understanding your control system s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols.

Learn Python & Ethical Hacking From Scratch

Posted By: Sigha
Learn Python & Ethical Hacking From Scratch

Learn Python & Ethical Hacking From Scratch
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 12.1 GB
Duration: 23.5 hours | Genre: eLearning | Language: English

Start from 0 & learn both topics simultaneously from scratch by writing 20+ hacking programs

Complete Ethical Hacking & Penetration Testing for Web Apps

Posted By: Sigha
Complete Ethical Hacking & Penetration Testing for Web Apps

Complete Ethical Hacking & Penetration Testing for Web Apps
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 2.03 GB
Duration: 3.5 hours | Genre: eLearning | Language: English


Learn OWASP TOP 10 Vulnerability Categories and the Defenses and Fixes for them. Covering all the popular hacking types.

Data Protection Compliance in the Cloud [Kindle Edition]

Posted By: AlenMiler
Data Protection Compliance in the Cloud [Kindle Edition]

Data Protection Compliance in the Cloud by Dominic Staiger
English | September 18, 2017 | ASIN: B075RHC66G | 484 pages | AZW3 | 0.91 MB

How to Erase Yourself from the Internet Completely: How to Remain Anonymous Online [Kindle Edition]

Posted By: AlenMiler
How to Erase Yourself from the Internet Completely: How to Remain Anonymous Online [Kindle Edition]

How to Erase Yourself from the Internet Completely: How to Remain Anonymous Online by Mohan Menon
English | March 22, 2017 | ASIN: B06XSYNRS1 | 108 pages | AZW3 | 0.97 MB

Learning Malware Analysis

Posted By: ksveta6
Learning Malware Analysis

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware by Monnappa K A
2018 | ISBN: 1788392507 | English | 510 pages | PDF | 17 MB

IS20 Security Controls (IS20)

Posted By: naag
IS20 Security Controls (IS20)

IS20 Security Controls (IS20)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | 1.20 GB
Genre: eLearning | Language: English

Mastering Networks (Repost)

Posted By: AvaxGenius
Mastering Networks (Repost)

Mastering Networks By William J. Buchanan BSc (Hons.), CEng, PhD
English | PDF | 1999 | 492 Pages | ISBN : 0333748042 | 45.26 MB

Computer networks are a crucial part of many organisations and many users now even have a network connection in their own home. Without networks there would be no Electronic Mail, no Internet access and no Networked Applications. It is one of the fastest moving technologies and brings benefits to virtually every country in the world. With the interconnection of networks to the Internet, the world has truly become a Global Village. For many people the first place to search for a given topic is the World Wide Web.

Cyber-Physical Systems: Architecture, Security and Application

Posted By: AvaxGenius
Cyber-Physical Systems: Architecture, Security and Application

Cyber-Physical Systems: Architecture, Security and Application by Song Guo
English | PDF,EPUB | 2018 (2019 Edition) | 254 Pages | ISBN : 3319925636 | 33.94 MB

This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements.

Analyzing Human Behavior in Cyberspace

Posted By: Underaglassmoon
Analyzing Human Behavior in Cyberspace

Analyzing Human Behavior in Cyberspace
IGI Global | English | 2018 | ISBN-10: 1522571280 | 333 pages | PDF, ePUB | 5.06 + 12.11 MB

by Zheng Yan (Author, Editor)
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition

Cosmic Threats : A Planetary Response

Posted By: readerXXI
Cosmic Threats : A Planetary Response

Cosmic Threats : A Planetary Response
by Neville Brown
English | 2018 | ISBN: 1845197712 | 200 Pages | PDF | 2.61 MB