Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Implementing Physical Security

Posted By: naag
Implementing Physical Security

Implementing Physical Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 44M | 227 MB
Genre: eLearning | Language: English

Physical security controls protect digital assets that are processed and stored on physical equipment, including smartphones. In this course, you'll learn how to ensure the security and availability of IT systems. Software required: EXO5 and…

Everyman's Guide to Internet Security: The Internet stripped bare

Posted By: AlenMiler
Everyman's Guide to Internet Security: The Internet stripped bare

Everyman's Guide to Internet Security: The Internet stripped bare by MIke Antrobus
English | 27 Jun. 2017 | ASIN: B073G2LRF6 | 168 Pages | AZW3 | 746.27 KB

Pluralsight - Threat Modeling: The Big Picture

Posted By: First1
Pluralsight - Threat Modeling: The Big Picture

Pluralsight - Threat Modeling: The Big Picture
Size: 94.82 MB | Duration: 1 hr 5 mins | Video: AVC (.mp4) 1024x768 15fps | Audio: AAC 44KHz 2ch
Genre: eLearning | Level: Beginner | Language: English | +Exercise files

In this course, you'll be provided with a high-level overview of what threat modeling is, how it can be used, and potential challenges you may face when attempting to use threat modeling for your day to day activities, projects, or environments.

Pluralsight - Play by Play: Knowing When to Code in Salesforce

Posted By: First1
Pluralsight - Play by Play: Knowing When to Code in Salesforce

Pluralsight - Play by Play: Knowing When to Code in Salesforce
Size: 685.32 MB | Duration: 2 hrs 5 mins | Video: AVC (.mp4) 1024x768 24fps | Audio: AAC 44KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

In this course, you'll discover when and how to choose a declarative versus a programmatic solution for any development task in Salesforce.

Essentials of Enterprise Network Security: InfoSec pros lay out the basics for protecting networks (Peerlyst Presents)

Posted By: AlenMiler
Essentials of Enterprise Network Security: InfoSec pros lay out the basics for protecting networks (Peerlyst Presents)

Essentials of Enterprise Network Security: InfoSec pros lay out the basics for protecting networks (Peerlyst Presents) by Limor Elbaz
English | 26 Jun. 2017 | ASIN: B073DQ873G | 95 Pages | AZW3 | 245.75 KB

Information Theoretic Security and Privacy of Information Systems

Posted By: AlenMiler
Information Theoretic Security and Privacy of Information Systems

Information Theoretic Security and Privacy of Information Systems by Rafael F. Schaefer
English | 30 Jun. 2017 | ASIN: B071226PFF | 574 Pages | AZW3 | 6.56 MB

Udemy - Reverse Engineering and Exploit Development (Repost)

Posted By: First1
Udemy - Reverse Engineering and Exploit Development (Repost)

Udemy - Reverse Engineering and Exploit Development (Repost)
Size: 1.41 GB | Duration: 6 hours | Video: AVC (.mp4) 1280x720 15fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | +Working files

Application Penetration Testing for Security Professionals.

Überwachungswahn: ...wie umgehen ??

Posted By: AlenMiler
Überwachungswahn: ...wie umgehen ??

Überwachungswahn: …wie umgehen ?? by Herr Meier
German | 26 Jun. 2017 | ASIN: B073C94DVN | 47 Pages | AZW3 | 200.75 KB

Android Malware (Repost)

Posted By: AvaxGenius
Android Malware (Repost)

Android Malware By Xuxian Jiang, Yajin Zhou
English | PDF | 2013 | 50 Pages | ISBN : 1461473934 | 1.6 MB

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns.

Análise de pacotes na prática: Usando Wireshark para solucionar problemas de rede do mundo real

Posted By: AlenMiler
Análise de pacotes na prática: Usando Wireshark para solucionar problemas de rede do mundo real

Análise de pacotes na prática: Usando Wireshark para solucionar problemas de rede do mundo real by Chris Sanders
Portuguese | 26 Jun. 2017 | ASIN: B0731W7BC2 | 643 Pages | AZW3 | 14.62 MB

Security Solutions and Applied Cryptography in Smart Grid Communications

Posted By: Underaglassmoon
Security Solutions and Applied Cryptography in Smart Grid Communications

Security Solutions and Applied Cryptography in Smart Grid Communications
IGI | English | 2017 | ISBN-10: 1522518290 | 463 pages | PDF | 18.09 mb

by Mohamed Amine Ferrag (Editor), Ahmed Ahmim (Editor)

OpenVPN Cookbook - Second Edition

Posted By: readerXXI
OpenVPN Cookbook - Second Edition

OpenVPN Cookbook - Second Edition
by Jan Just Keijser
English | 2017 | ISBN: 1786463121 | 395 Pages | True PDF | 5.4 MB

Zabbix: Enterprise Network Monitoring Made Easy

Posted By: readerXXI
Zabbix: Enterprise Network Monitoring Made Easy

Zabbix: Enterprise Network Monitoring Made Easy
by Rihards Olups and Andrea Dalle Vacche
English | 2017 | ISBN: 1787283313 | 1327 Pages | True PDF | 25 MB

The Practice of Network Security Monitoring: Understanding Incident Detection and Response (repost)

Posted By: roxul
The Practice of Network Security Monitoring: Understanding Incident Detection and Response (repost)

Richard Bejtlich, "The Practice of Network Security Monitoring: Understanding Incident Detection and Response"
English | 2013 | ISBN-10: 1593275099 | 341 pages | PDF, EPUB | 28,5 MB

Kali Linux: Assuring Security by Penetration Testing (repost)

Posted By: roxul
Kali Linux: Assuring Security by Penetration Testing (repost)

Tedi Heriyanto, Lee Allen, "Kali Linux: Assuring Security by Penetration Testing"
2014 | ISBN-10: 184951948X | 454 pages | PDF | 8 MB