Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Differential Privacy and Applications

Posted By: AvaxGenius
Differential Privacy and Applications

Differential Privacy and Applications By Tianqing Zhu, Gang LiWanlei Zhou, Philip S. Yu
English | PDF | 2017 | 243 Pages | ISBN : 3319620029 | 7.12 MB

This book focuses on differential privacy and its application with an emphasis on technical and application aspects. This book also presents the most recent research on differential privacy with a theory perspective. It provides an approachable strategy for researchers and engineers to implement differential privacy in real world applications.

Writing Linux Device Drivers (Repost)

Posted By: igor_lv
Writing Linux Device Drivers (Repost)

Writing Linux Device Drivers: a guide with exercises Paperback - Jerry Cooperstein
2009 | ISBN: 1448672384 | PDF | 375 pages | 18 Mb

Writing Linux Device Drivers is designed to show experienced programmers how to develop device drivers for Linux systems, and give them a basic understanding and familiarity with the Linux kernel.

Terrorism: A Very Short Introduction [Audiobook] (Repost)

Posted By: First1
Terrorism: A Very Short Introduction [Audiobook] (Repost)

Terrorism: A Very Short Introduction [Audiobook] by Charles Townshend (Repost)
English | August 4th, 2009 | ASIN: B003H86PRO, ISBN: 0199603944 | MP3@32 kbps | 5 hrs 19 mins | 73.07 MB
Narrator: Peter Ganim

This book charts a path through the outpouring of efforts to understand and explain modern terrorism, by asking what makes terrorism different from other forms of political and military action, what makes it effective, and what can be done about it.

Smart Cards, Tokens, Security and Applications [Repost]

Posted By: hill0
Smart Cards, Tokens, Security and Applications [Repost]

Smart Cards, Tokens, Security and Applications by Keith Mayes
English | 29 July 2017 | ISBN: 3319504983 | 568 Pages | PDF | 16.38 MB

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management.

Intelligence-Driven Incident Response: Outwitting the Adversary

Posted By: AlenMiler
Intelligence-Driven Incident Response: Outwitting the Adversary

Intelligence-Driven Incident Response: Outwitting the Adversary by Scott J Roberts
English | 21 Aug. 2017 | ISBN: 1491934948 | ASIN: B074ZRN5T7 | 284 Pages | AZW3 | 2.39 MB

Information Security Auditor : Careers in Information Security

Posted By: readerXXI
Information Security Auditor : Careers in Information Security

Information Security Auditor : Careers in Information Security
by Wendy Goucher
English | 2016 | ISBN: 1780172168 | 167 Pages | True PDF | 7.7 MB

Hackers: Heroes of the Computer Revolution (repost)

Posted By: Willson
Hackers: Heroes of the Computer Revolution (repost)

Steven Levy, "Hackers: Heroes of the Computer Revolution"
English | 2010 | ISBN: 1449388396 | 520 pages | PDF | 13 MB

Feistel Ciphers: Security Proofs and Cryptanalysis [Repost]

Posted By: hill0
Feistel Ciphers: Security Proofs and Cryptanalysis [Repost]

Feistel Ciphers: Security Proofs and Cryptanalysis by Valerie Nachef
English | 28 Feb. 2017 | ISBN: 3319495283 | 328 Pages | PDF | 2.26 MB

This book provides a survey on different kinds of Feistel ciphers, with their definitions and mathematical/computational properties. Feistel ciphers are widely used in cryptography in order

Fundamentals of Secure System Modelling

Posted By: AvaxGenius
Fundamentals of Secure System Modelling

Fundamentals of Secure System Modelling By Raimundas Matulevičius
English | PDF | 2017 | 225 Pages | ISBN : 3319617168 | 12.74 MB

This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational.

The ASP.NET 2.0 Anthology: 101 Essential Tips, Tricks & Hacks

Posted By: Willson
The ASP.NET 2.0 Anthology: 101 Essential Tips, Tricks & Hacks

Scott Allen, Jeff Atwood, Wyatt Barnett, Jon Galloway, Phil Haack, "The ASP.NET 2.0 Anthology: 101 Essential Tips, Tricks & Hacks"
English | 2007 | ISBN: 098028581X | 500 pages | EPUB / MOBI | 13.2 MB

The CSS Anthology: 101 Essential Tips, Tricks & Hacks, 3rd Edition

Posted By: Willson
The CSS Anthology: 101 Essential Tips, Tricks & Hacks, 3rd Edition

Rachel Andrew, "The CSS Anthology: 101 Essential Tips, Tricks & Hacks, 3rd Edition"
English | 2009 | ISBN: 0980576806 | 400 pages | EPUB / MOBI | 18 MB

Digital Forensics and Incident Response

Posted By: AlenMiler
Digital Forensics and Incident Response

Digital Forensics and Incident Response by Gerard Johansen
English | 24 July 2017 | ISBN: 1787288684 | ASIN: B071JM42J1 | 324 Pages | AZW3 | 13.66 MB

Metasploit for Beginners

Posted By: AlenMiler
Metasploit for Beginners

Metasploit for Beginners by Sagar Rahalkar
English | 21 July 2017 | ISBN: 1788295978 | ASIN: B0723CG5TN | 190 Pages | AZW3 | 13.31 MB

CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)

Posted By: AlenMiler
CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501)

CompTIA Security+ Certification Practice Exams, Third Edition (Exam SY0-501) by Daniel Lachance
English | 18 Aug. 2017 | ISBN: 1260026906 | ASIN: B074NHCRFH | 385 Pages | AZW3 | 8.68 MB

Security+ Certification - Threats and Vulnerabilities Domain

Posted By: naag
Security+ Certification - Threats and Vulnerabilities Domain

Security+ Certification - Threats and Vulnerabilities Domain
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | Lec: 20 | 927 MB
Genre: eLearning | Language: English

Pass the 'Threats and Vulnerabilities' section of the Security+ exam.