Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Terrorism: Commentary on Security Documents: Volume 141: Hybrid Warfare and the Gray Zone Threat

Posted By: ksveta6
Terrorism: Commentary on Security Documents: Volume 141: Hybrid Warfare and the Gray Zone Threat

Terrorism: Commentary on Security Documents: Volume 141: Hybrid Warfare and the Gray Zone Threat by Douglas Lovelace
2016 | ISBN: 0190255315 | English | 392 pages | PDF | 7 MB

Terrorism: Volume 143: The Evolution of the Islamic State

Posted By: ksveta6
Terrorism: Volume 143: The Evolution of the Islamic State

Terrorism: Volume 143: The Evolution of the Islamic State (Terrorism: Commentary on Security Documents) by Douglas C. Lovelace
2016 | ISBN: 0190255331 | English | 368 pages | PDF | 9 MB

Terrorism: Volume 142: Security Strategies of the Second Obama Administration: 2015 Developments

Posted By: ksveta6
Terrorism: Volume 142: Security Strategies of the Second Obama Administration: 2015 Developments

Terrorism: Commentary on Security Documents: Volume 142: Security Strategies of the Second Obama Administration: 2015 Developments by Douglas Lovelace
2016 | ISBN: 0190255323 | English | 312 pages | PDF | 3 MB

Computer Forensics and Digital Investigation with EnCase Forensic v7

Posted By: nebulae
Computer Forensics and Digital Investigation with EnCase Forensic v7

Suzanne Widup, "Computer Forensics and Digital Investigation with EnCase Forensic v7"
English | ISBN: 0071807918 | 2014 | 448 pages | PDF | 40 MB

Cryptography InfoSec Pro Guide

Posted By: nebulae
Cryptography InfoSec Pro Guide

Sean-Philip Oriyano, "Cryptography InfoSec Pro Guide"
English | ISBN: 0071794255 | 2013 | 336 pages | True PDF | 13 MB

Mastering Mobile Forensics

Posted By: readerXXI
Mastering Mobile Forensics

Mastering Mobile Forensics
by Soufiane Tahiri
English | 2016 | ISBN: 1785287818 | 317 Pages | True PDF | 16 MB

This book aims to provide the forensic community an in-depth insight into mobile forensic techniques when it comes to deal with recent smartphones operating systems.

Practical Mobile Forensics - Second Edition

Posted By: readerXXI
Practical Mobile Forensics - Second Edition

Practical Mobile Forensics - Second Edition
by Heather Mahalik and Rohit Tamma
English | 2016 | ISBN: 1786464209 | 403 Pages | PDF | 11 MB

A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms.

Understanding Cryptography: A Textbook for Students and Practitioners [Repost]

Posted By: tanas.olesya
Understanding Cryptography: A Textbook for Students and Practitioners [Repost]

Understanding Cryptography: A Textbook for Students and Practitioners by Christof Paar
English | 27 Nov. 2009 | ISBN: 3642041000 | 382 Pages | PDF | 6 MB

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants.

Post-Quantum Cryptography [Repost]

Posted By: tanas.olesya
Post-Quantum Cryptography  [Repost]

Post-Quantum Cryptography by Daniel J. Bernstein
English | 19 Nov. 2008 | ISBN: 3540887016 | 248 Pages | PDF | 2 MB

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA.

Handbook of Remote Biometrics [Repost]

Posted By: tanas.olesya
Handbook of Remote Biometrics [Repost]

Handbook of Remote Biometrics: for Surveillance and Security by Massimo Tistarelli
English | 19 Jun. 2009 | ISBN: 1848823843 | 381 Pages | PDF | 13 MB

The development of technologies for the identi?cation of individuals has driven the interest and curiosity of many people. Spearheaded and inspired by the Bertillon coding system for the classi?

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Repost)

Posted By: nebulae
Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition (Repost)

Mark Collier and David Endler, "Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions, Second Edition"
English | 2014 | ISBN: 0071798765 | 560 pages | PDF + EPUB | 50 MB

Fundamentals Of Information Systems Security

Posted By: andr1078
Fundamentals Of Information Systems Security

David Kim, Michael G. Solomon "Fundamentals Of Information Systems Security"
Publisher: Jones & Bartlett Learning | English | 2016 | ISBN: 128411645X | 548 pages | PDF | 10.7 MB

Revised and updated with the latest data in the field, Fundamentals of Information Systems Security, Third Edition provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security.

Hardware-based Computer Security [Repost]

Posted By: tanas.olesya
Hardware-based Computer Security [Repost]

Hardware-based Computer Security: From Biometrics to Quantum Cryptography by Roger R. Dube
English | 12 Sept. 2008 | ISBN: 0470193395 | 256 Pages | PDF | 14 MB

Presents primary hardware–based computer security approaches in an easy–to–read toolbox format.

Secure Key Establishment [Repost]

Posted By: tanas.olesya
Secure Key Establishment [Repost]

Secure Key Establishment by Kim-Kwang Raymond Choo
English | 9 Dec. 2008 | ISBN: 0387879684 | 229 Pages | PDF | MB

Research on Secure Key Establishment has become very active within the last few years. Secure Key Establishment discusses the problems encountered in this field. This book also introduces several improved protocols with new proofs of security.

Cryptography and Security Services [Repost]

Posted By: tanas.olesya
Cryptography and Security Services [Repost]

Cryptography and Security Services: Mechanisms and Applications by Manuel Mogollon
CyberTech Publishing; 1 edition | January 7, 2008 | English | ISBN: 159904837X | 490 pages | PDF | 4 MB

Today's information technology and security networks demand increasingly complex algorithms and cryptographic systems.