Subcategories

iOS Penetration Testing: A Definitive Guide to iOS Security [Repost]

Posted By: hill0
iOS Penetration Testing: A Definitive Guide to iOS Security [Repost]

iOS Penetration Testing: A Definitive Guide to iOS Security by Kunal Relan
English | 9 Dec. 2016 | ISBN: 1484223543 | 160 Pages | PDF/EPUB | 10.51 MB

Unearth some of the most significant attacks threatening iOS applications in recent times and learn methods of patching them to make payment transactions and personal data sharing more secure.

Future Data and Security Engineering

Posted By: AvaxGenius
Future Data and Security Engineering

Future Data and Security Engineering: 4th International Conference, FDSE 2017, Ho Chi Minh City, Vietnam, November 29 – December 1, 2017, Proceedings By Tran Khanh Dang
English | PDF | 2017 | 491 Pages | ISBN : 3319700030 | 32.71 MB

This book constitutes the refereed proceedings of the Third International Conference on Future Data and Security Engineering, FDSE 2016, held in Can Tho City, Vietnam, in November 2016.

Financial Cryptography and Data Security

Posted By: AvaxGenius
Financial Cryptography and Data Security

Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers By Michael Brenner
English | PDF | 2017 | 646 Pages | ISBN : 3319702777 | 20.18 MB

This book constitutes the refereed proceedings of 5 workshops held at the 21st International Conference on Financial Cryptography and Data Security, FC 2017, in Sliema, Malta, in April 2017.

Salafi-Jihadism: The History of an Idea

Posted By: First1
Salafi-Jihadism: The History of an Idea

Salafi-Jihadism: The History of an Idea by Shiraz Maher
English | November 1st, 2016 (2017 Edition) | ASIN: B01NB18M9Z, ISBN: 0141986263, 0190651121 | 305 Pages | EPUB | 1.17 MB

'Readers looking for a rigorous but lucid account of Islamic State's ideas will be well-served by Maher's book … the first of its kind' Kyle W. Orton, Wall Street Journal

Making Your Ecommerce Store Hack Proof

Posted By: naag
Making Your Ecommerce Store Hack Proof

Making Your Ecommerce Store Hack Proof
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | Lec: 7 | 371 MB
Genre: eLearning | Language: English

Learn how to make your ecommerce site hackproof

Critical Infrastructure Protection XI

Posted By: AvaxGenius
Critical Infrastructure Protection XI

Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International Conference, ICCIP 2017, Arlington, VA, USA, March 13-15, 2017, Revised Selected Papers By Mason Rice
English | PDF | 2017 | 341 Pages | ISBN : 3319703943 | 16.13 MB

The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.

Intelligent Mechanisms for Network Configuration and Security

Posted By: step778
Intelligent Mechanisms for Network Configuration and Security

Steven Latré, Marinos Charalambides, Jérôme François, "Intelligent Mechanisms for Network Configuration and Security"
2015 | pages: 164 | ISBN: 331920033X | PDF | 4,6 mb

Ecommerce Store Security and Customer Frauds

Posted By: naag
Ecommerce Store Security and Customer Frauds

Ecommerce Store Security and Customer Frauds
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 7 | 202 MB
Genre: eLearning | Language: English

Learn about how to secure your ecommerce store and avoid customer frauds.

Cryptography and PKI for CompTIA Security+

Posted By: naag
Cryptography and PKI for CompTIA Security+

Cryptography and PKI for CompTIA Security+
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 45M | 231 MB
Genre: eLearning | Language: English

Encryption is a vital component to every company's security posture and provides the means to securely access, transmit, verify, and dispose of data. In this course, you'll learn the fundamentals of cryptography and Public Key Infrastructure (PKI).

Cyber Security Course for Beginners - Level 01

Posted By: naag
Cyber Security Course for Beginners - Level 01

Cyber Security Course for Beginners - Level 01
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 13 | 172 MB
Genre: eLearning | Language: English

Learn the Security Fundamentals required for your everyday online presence.

Gray Hat Hacking The Ethical Hackers Handbook (Repost)

Posted By: igor_lv
Gray Hat Hacking The Ethical Hackers Handbook (Repost)

Gray Hat Hacking The Ethical Hackers Handbook - Allen Harper
2011 | 3rd Edition | ISBN: 0071742557 | PDF | 720 pages | 12 Mb

Professional Rootkits

Posted By: First1
Professional Rootkits

Professional Rootkits by Ric Vieler
English | March 12th, 2007 | ISBN: 0470101547 | 359 Pages | PDF | 4.76 MB

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for developing and testing them, and the detection methods to impede their distribution.

Post-Quantum Cryptography [Repost]

Posted By: hill0
Post-Quantum Cryptography [Repost]

Post-Quantum Cryptography by Daniel J. Bernstein
English | 19 Nov. 2008 | ISBN: 3540887016 | 256 Pages | PDF | 2.21 MB

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms,

Tiger Check: Automating the US Air Force Fighter Pilot in Air-to-Air Combat, 1950–1980

Posted By: First1
Tiger Check: Automating the US Air Force Fighter Pilot in Air-to-Air Combat, 1950–1980

Tiger Check: Automating the US Air Force Fighter Pilot in Air-to-Air Combat, 1950–1980 by Steven A. Fino
English | October 17th, 2017 | ISBN: 1421423278, 9781421423272 | 449 Pages | True PDF | 26.74 MB

Spurred by their commanders during the Korean War to be "tigers," aggressive and tenacious American fighter pilots charged headlong into packs of fireball-spewing enemy MiGs, relying on their keen eyesight, piloting finesse, and steady trigger fingers to achieve victory.

Cloud-Based Cyber-Physical Systems in Manufacturing

Posted By: Underaglassmoon
Cloud-Based Cyber-Physical Systems in Manufacturing

Cloud-Based Cyber-Physical Systems in Manufacturing
Springer | English | Dec 2017 | ISBN-10: 331967692X | 404 pages | PDF | 17.73 mb

by Lihui Wang (Author),‎ Xi Vincent Wang (Author)