Subcategories

Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity

Posted By: Jeembo
Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity

Transactions on Computational Science XXX: Special Issue on Cyberworlds and Cybersecurity by Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin
English | 2017 | ISBN: 3662560054 | 111 Pages | PDF | 29.2 MB

This, the 30th issue of the Transactions on Computational Science journal, is comprised of extended versions of selected papers from the International Conference on Cyberworlds, held in Chongqing, China, in September 2016.

Habeas Data: Privacy vs. the Rise of Surveillance Tech [Audiobook]

Posted By: tarantoga
Habeas Data: Privacy vs. the Rise of Surveillance Tech [Audiobook]

Cyrus Farivar, Steven Jay Cohen (Narrator), "Habeas Data: Privacy vs. the Rise of Surveillance Tech"
ASIN: B07CTS6VWW, ISBN: 1977364098 | 2018 | MP3@64 kbps | ~11:38:00 | 331 MB

Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging (Repost)

Posted By: AvaxGenius
Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging (Repost)

Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging By Darren Quick
English | PDF,EPUB | 2018 | 109 Pages | ISBN : 9811077622 | 5.27 MB

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.

Advanced Computing and Systems for Security: Volume Five (Repost)

Posted By: AvaxGenius
Advanced Computing and Systems for Security: Volume Five (Repost)

Advanced Computing and Systems for Security: Volume Five by Rituparna Chaki
English | PDF | 2018 | 180 Pages | ISBN : 9811081794 | 8.13 MB

This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments of Computer Science & Engineering and A. K. Choudhury School of Information Technology, both from University of Calcutta in collaboration with NIT, Patna. The International partners for ACSS 2016 had been Ca Foscari University of Venice, Italy and Bialystok University of Technology, Poland.

Honeypot Frameworks and Their Applications: A New Framework (Repost)

Posted By: AvaxGenius
Honeypot Frameworks and Their Applications: A New Framework (Repost)

Honeypot Frameworks and Their Applications: A New Framework By Chee Keong NG
English | PDF,EPUB | 2018 | 88 Pages | ISBN : 981107738X | 2.24 MB

This book presents the latest research on honeypots and their applications. After introducing readers to the basic concepts of honeypots and common types, it reviews various honeypot frameworks such as web-server-based, client-based, shadow and artificially intelligent honeypots. In addition, it offers extensive information on the contribution of honeypots in some of the most popular malware research area such as DDoS, Worm, APT, forensics and Bot attacks.

Cybersecurity in China: The Next Wave

Posted By: AvaxGenius
Cybersecurity in China: The Next Wave

Cybersecurity in China: The Next Wave By Greg Austin
English | PDF,EPUB | 2018 | 147 Pages | ISBN : 3319684353 | 2.28 MB

This book offers the first benchmarking study of China’s response to the problems of security in cyber space. There are several useful descriptive books on cyber security policy in China published between 2010 and 2016. As a result, we know quite well the system for managing cyber security in China, and the history of policy responses. What we don’t know so well, and where this book is useful, is how capable China has become in this domain relative to the rest of the world. This book is a health check, a report card, on China’s cyber security system in the face of escalating threats from criminal gangs and hostile states. The book also offers an assessment of the effectiveness of China’s efforts. It lays out the major gaps and shortcomings in China’s cyber security policy. It is the first book to base itself around an assessment of China’s cyber industrial complex, concluding that China does not yet have one. As Xi Jinping said in July 2016, the country’s core technologies are dominated by foreigners.

Network Security

Posted By: naag
Network Security

Network Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours 15M | 389 MB
Genre: eLearning | Language: English

Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment (repost)

Posted By: hill0
Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment (repost)

Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment by Nicolas Sklavos
English | 17 Jan. 2017 | ISBN: 331944316X | 266 Pages | PDF | 7.61 MB

Information Security: Principles and Practices

Posted By: tarantoga
Information Security: Principles and Practices

Mark S. Merkow, Jim Breithaupt, "Information Security: Principles and Practices, 2nd Edition"
ISBN: 0789753251 | 2014 | EPUB | 368 pages | 3 MB

Information Security Practices: Emerging Threats and Perspectives [Repost]

Posted By: hill0
Information Security Practices: Emerging Threats and Perspectives [Repost]

Information Security Practices: Emerging Threats and Perspectives by Issa Traoré
English | 24 Jan. 2017 | ISBN: 3319489461 | 114 Pages | PDF | 3.07 MB

Advanced Monitoring in P2P Botnets: A Dual Perspective

Posted By: AvaxGenius
Advanced Monitoring in P2P Botnets: A Dual Perspective

Advanced Monitoring in P2P Botnets: A Dual Perspective by Shankar Karuppayah
English | PDF,EPUB | 2018 | 117 Pages | ISBN : 9811090491 | 4.40 MB

This book presents current research in the area of advanced monitoring in P2P botnets, and uses a dual-perspective approach to discuss aspects of botnet monitoring in-depth. First, from the perspective of a defender, e.g. researchers, it introduces advanced approaches to successfully monitor botnets, taking the presence of current botnet anti-monitoring mechanisms into consideration. Then, adopting a botmaster perspective to anticipate the advances in future botnets, it introduces advanced measures to detect and prevent monitoring activities. All the proposed methods were evaluated either using real-world data or in a simulation scenario. In addition to providing readers with an in-depth understanding of P2P botnets, the book also analyzes the implications of the various design choices of recent botnets for effectively monitoring them. It serves as an excellent introduction to new researchers and provides a useful review for specialists in the field.

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation

Posted By: AvaxGenius
Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation

Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation By Sergei Petrenko
English | PDF,EPUB | 2018 | 271 Pages | ISBN : 3319790358 | 11.30 MB

This timely book offers rare insight into the field of cybersecurity in Russia – a significant player with regard to cyber-attacks and cyber war. Big Data Technologies for Monitoring of Computer Security presents possible solutions to the relatively new scientific/technical problem of developing an early-warning cybersecurity system for critically important governmental information assets. Using the work being done in Russia on new information security systems as a case study, the book shares valuable insights gained during the process of designing and constructing open segment prototypes of this system.

Ultimate Wordpress Security Mastery

Posted By: naag
Ultimate Wordpress Security Mastery

Ultimate Wordpress Security Mastery
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 40M | Lec: 16 | 73 MB
Genre: eLearning | Language: English

Cyber Security: Endpoint Defense

Posted By: naag
Cyber Security: Endpoint Defense

Cyber Security: Endpoint Defense
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 316 MB
Genre: eLearning | Language: English

The Role of Shadow IT and How to Bring it out of the Darkness

Posted By: IrGens
The Role of Shadow IT and How to Bring it out of the Darkness

The Role of Shadow IT and How to Bring it out of the Darkness
.MP4, AVC, 1400 kbps, 1280x720 | English, AAC, 96 kbps, 2 Ch | 39m 58s | 395 MB
Instructor: Troy Hunt