Subcategories

Proceedings of the First International Conference on Intelligent Computing and Communication

Posted By: Nice_smile)
Proceedings of the First International Conference on Intelligent Computing and Communication

Proceedings of the First International Conference on Intelligent Computing and Communication by Jyotsna Kumar Mandal
English | 2017 | ISBN: 9811020345 | 707 Pages | PDF | 21.81 MB

Applications and Techniques in Information Security

Posted By: ChrisRedfield
Applications and Techniques in Information Security

Wenjia Niu, Gang Li, Jiqiang Liu, Jianlong Tan, Li Guo, Zhen Han, Lynn Batten - Applications and Techniques in Information Security
Published: 2015-11-12 | ISBN: 3662486822 | PDF | 398 pages | 53.59 MB

Ethical Hacking: SQL Injection [repost]

Posted By: naag
Ethical Hacking: SQL Injection [repost]

Ethical Hacking: SQL Injection
MP4 | AVC 316kbps | English | 1024x768 | 15fps | 5h 25mins | AAC stereo 105kbps | 629 MB
Genre: Video Training

Stabilization, Safety, and Security of Distributed Systems

Posted By: DZ123
Stabilization, Safety, and Security of Distributed Systems

Pascal Felber, Vijay Garg, "Stabilization, Safety, and Security of Distributed Systems"
English | 2014 | ISBN: 3319117637 | PDF | pages: 381 | 6.6 mb

Communication Technologies, Information Security and Sustainable Development

Posted By: DZ123
Communication Technologies, Information Security and Sustainable Development

Faisal Karim Shaikh, Bhawani Shankar Chowdhry, Sherali Zeadally, "Communication Technologies, Information Security and Sustainable Development"
English | 2014 | ISBN: 3319109863 | PDF | pages: 316 | 58.3 mb

Crime and Intelligence Analysis: An Integrated Real-Time Approach

Posted By: ksveta6
Crime and Intelligence Analysis: An Integrated Real-Time Approach

Crime and Intelligence Analysis: An Integrated Real-Time Approach by Glenn Grana, James Windell
2016 | ISBN: 1498751725 | English | 403 pages | PDF | 7 MB

Ethical Hacking: Reconnaissance/Footprinting (2015) [repost]

Posted By: naag
Ethical Hacking: Reconnaissance/Footprinting (2015) [repost]

Ethical Hacking: Reconnaissance/Footprinting
MP4 | AVC 90kbps | English | 1024x768 | 15fps | 3h 28mins | AAC stereo 103kbps | 500 MB
Genre: Video Training

Network Security Auditing [Repost]

Posted By: ChrisRedfield
Network Security Auditing [Repost]

Network Security Auditing
Published: 2010-06-12 | ISBN: 1587053527 | PDF | 528 pages | 11.34 MB

Learn How To Create a Hacking / Penetration Testing Lab

Posted By: naag
Learn How To Create a Hacking / Penetration Testing Lab

Learn How To Create a Hacking / Penetration Testing Lab
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 11 | 321 MB
Genre: eLearning | Language: English

Learn how to install Kali Linux, Windows and Metasploitable on a single computer inside your current operating system.

Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society)

Posted By: Nice_smile)
Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society)

Cybercrime: Digital Cops in a Networked Environment (Ex Machina: Law, Technology, and Society) by J. M. Balkin
English | 2007 | ISBN: 0814799701 | 268 Pages | PDF | 1.09 MB

Network and System Security

Posted By: DZ123
Network and System Security

Man Ho Au, Barbara Carminati, C.-C. Jay Kuo, "Network and System Security"
English | 2014 | ISBN: 3319116975 | PDF | pages: 590 | 20.2 mb

Best Internet Links

Posted By: Alex

Safety Message Broadcast in Vehicular Networks (Wireless Networks)

Posted By: Nice_smile)
Safety Message Broadcast in Vehicular Networks (Wireless Networks)

Safety Message Broadcast in Vehicular Networks (Wireless Networks) by Yuanguo Bi
English | 2017 | ISBN: 3319473514 | 109 Pages | PDF | 3.15 MB

Security in the Private Cloud

Posted By: interes
Security in the Private Cloud

Security in the Private Cloud by John R. Vacca
English | 2016 | ISBN: 1482259559 | 405 pages | PDF | 15 MB

Real-World Electronic Voting: Design, Analysis and Deployment

Posted By: interes
Real-World Electronic Voting: Design, Analysis and Deployment

Real-World Electronic Voting: Design, Analysis and Deployment (Series in Security, Privacy and Trust) by Feng Hao and Peter Y. A. Ryan
English | 2016 | ISBN: 1498714692 | 477 pages | PDF | 31,5 MB

Cyberbullying and the Wild, Wild Web: What Everyone Needs to Know

Posted By: ksveta6
Cyberbullying and the Wild, Wild Web: What Everyone Needs to Know

Cyberbullying and the Wild, Wild Web: What Everyone Needs to Know by J.A. Hitchcock
2017 | ISBN: 1442251174 | English | 140 pages | EPUB | 3 MB