Subcategories

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: First1
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 449 Pages | True PDF | 25.61 MB

With industries expanding, cyber attacks have increased significantly. Understanding your control system s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols.

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Posted By: First1
Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Industrial Cybersecurity: Efficiently secure critical infrastructure systems by Pascal Ackerman
English | October 18th, 2017 | ISBN: 1788395158 | 456 Pages | EPUB | 24.91 MB

With industries expanding, cyber attacks have increased significantly. Understanding your control system s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols.

Learn Python & Ethical Hacking From Scratch

Posted By: Sigha
Learn Python & Ethical Hacking From Scratch

Learn Python & Ethical Hacking From Scratch
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 12.1 GB
Duration: 23.5 hours | Genre: eLearning | Language: English

Start from 0 & learn both topics simultaneously from scratch by writing 20+ hacking programs

Complete Ethical Hacking & Penetration Testing for Web Apps

Posted By: Sigha
Complete Ethical Hacking & Penetration Testing for Web Apps

Complete Ethical Hacking & Penetration Testing for Web Apps
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 2.03 GB
Duration: 3.5 hours | Genre: eLearning | Language: English


Learn OWASP TOP 10 Vulnerability Categories and the Defenses and Fixes for them. Covering all the popular hacking types.

Culture Hacker

Posted By: Underaglassmoon
Culture Hacker

Culture Hacker: Reprogramming Your Employee Experience to Improve Customer Service, Retention, and Performance
Wiley | English | 2017 | ISBN-10: 1119405726 | 224 pages | PDF | 2.61 MB

by Shane Green (Author)
HACK YOUR WORKPLACE CULTURE FOR GREATER PROFITS AND PRODUCTIVITY

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Posted By: AvaxGenius
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents by Eric C. Thompson
English | PDF,EPUB | 2018 | 184 Pages | ISBN : 1484238699 | 12.33 MB

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Certified Ethical Hacker Training Course for 2018

Posted By: naag
Certified Ethical Hacker Training Course for 2018

Certified Ethical Hacker Training Course for 2018
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 7.5 Hours | Lec: 113 | 937 MB
Genre: eLearning | Language: English

New Solutions for Cybersecurity (MIT Connection Science and Engineering)

Posted By: Underaglassmoon
New Solutions for Cybersecurity (MIT Connection Science and Engineering)

New Solutions for Cybersecurity (MIT Connection Science and Engineering)
MIT | English | 2017 | ISBN-10: 0262535378 | 504 pages | PDF | 21.63 MB

by Howard Shrobe (Editor), David L. Shrier (Editor), Alex Pentland (Editor)
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives

Hack Audio: An Introduction to Computer Programming and Digital Signal Processing in MATLAB

Posted By: Underaglassmoon
Hack Audio: An Introduction to Computer Programming and Digital Signal Processing in MATLAB

Hack Audio: An Introduction to Computer Programming and Digital Signal Processing in MATLAB
Routledge | English | 2018 | ISBN-10: 113849755X | 492 pages | EPUB | 20.1 MB

by Eric Tarr (Author)
Computers are at the center of almost everything related to audio. Whether for synthesis in music production, recording in the studio, or mixing in live sound, the computer plays an essential part.

Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Posted By: Underaglassmoon
Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Fuzzing for Software Security Testing and Quality Assurance, Second Edition
Artech House | English | 2018 | ISBN-10: 1608078507 | 330 pages | PDF | 24.12 MB

by Ari Takanen;Jared D. Demott;Charles Miller (Author)
This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle.

Hands-On Web Penetration Testing with Kali Linux

Posted By: naag
Hands-On Web Penetration Testing with Kali Linux

Hands-On Web Penetration Testing with Kali Linux
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 367 MB
Genre: eLearning | Language: English

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Posted By: First1
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking by Ric Messier
English | July 17th, 2018 | ISBN: 149202869X | 402 Pages | EPUB (True/HQ) | 18.54 MB

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

The Complete Nmap course: Beginner To Intermediate

Posted By: igor_lv
The Complete Nmap course: Beginner To Intermediate

The Complete Nmap course: Beginner To Intermediate
MP4 | Video: 1280x720 | Duration: 2 Hours | 0.6 GB | Subtitles: VTT
Author: Ofer Shmueli | Language: English | Skill level: All Levels

Master Nmap reconnaissance for ethical hacking and penetration testing

Android Hacking for Kali Linux - Expert in 21 days

Posted By: naag
Android Hacking for Kali Linux - Expert in 21 days

Android Hacking for Kali Linux - Expert in 21 days
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | Lec: 25 | 128 MB
Genre: eLearning | Language: English

Understanding Cybersecurity

Posted By: Underaglassmoon
Understanding Cybersecurity

Understanding Cybersecurity: Emerging Governance and Strategy
Rowman & Littlefield | English | 2018 | ISBN-10: 1786606798 | 286 pages | PDF | 17.38 MB

by Jr., Gary, Schaub (Editor)
Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war.