Subcategories

Facing Cyber Threats Head On : Protecting Yourself and Your Business

Posted By: readerXXI
Facing Cyber Threats Head On : Protecting Yourself and Your Business

Facing Cyber Threats Head On : Protecting Yourself and Your Business
by Brian Minick
English | 2016 | ISBN: 1442265485 | 126 Pages | True PDF | 3.32 MB

Beginning Ethical Hacking with Python [Repost]

Posted By: hill0
Beginning Ethical Hacking with Python [Repost]

Beginning Ethical Hacking with Python by Sanjib Sinha
English | 27 Dec. 2016 | ISBN: 1484225406 | 224 Pages | EPUB | 1.4 MB

CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 (Repost)

Posted By: DZ123
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 (Repost)

Kimberly Graves, "CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50"
English | 2007 | ISBN: 0782144373 | PDF | pages: 265 | 12.5 mb

Artificial Intelligence Tools for Cyber Attribution

Posted By: AvaxGenius
Artificial Intelligence Tools for Cyber Attribution

Artificial Intelligence Tools for Cyber Attribution by Eric Nunes
English | PDF,EPUB | 2018 | 97 Pages | ISBN : 3319737872 | 7.47 MB

This SpringerBrief discusses how to develop intelligent systems for cyber attribution regarding cyber-attacks. Specifically, the authors review the multiple facets of the cyber attribution problem that make it difficult for “out-of-the-box” artificial intelligence and machine learning techniques to handle.

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

Posted By: IrGens
Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)

Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2)
.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 64 kbps, 2 Ch | 4.5 hours | + SRT, PDF | 625 MB
Instructor: Zaid Sabih

The Best of 2600, Collector's Edition: A Hacker Odyssey (Repost)

Posted By: step778
The Best of 2600, Collector's Edition: A Hacker Odyssey (Repost)

Emmanuel Goldstein, "The Best of 2600, Collector's Edition: A Hacker Odyssey"
2009 | pages: 913 | ISBN: 0470458534 | PDF | 11,2 mb

Mac Hacks: Tips & Tools for unlocking the power of OS X (Repost)

Posted By: step778
Mac Hacks: Tips & Tools for unlocking the power of OS X (Repost)

Chris Seibold, "Mac Hacks: Tips & Tools for unlocking the power of OS X"
2013 | pages: 330 | ISBN: 1449325580 | EPUB | 18,7 mb

Miles Price - Hacking. Le Guide Complet du Débutant àordinateur Piratage et Tests Pénétration

Posted By: SSCN1926
Miles Price - Hacking. Le Guide Complet du Débutant àordinateur Piratage et Tests Pénétration

Miles Price - Hacking. Le Guide Complet du Débutant àordinateur Piratage et Tests Pénétration
French | Amazon Media EU | 2018 | EPUB | Pages 54 | ASIN: B0795DKW1B | 0,14 Mb

Cybercrime in Progress: Theory and prevention of technology-enabled offenses (Crime Science Series)

Posted By: zxcvbn
Cybercrime in Progress: Theory and prevention of technology-enabled offenses (Crime Science Series)

Cybercrime in Progress: Theory and prevention of technology-enabled offenses (Crime Science Series)
Thomas J Holt, Adam M Bossler | 2017 | PDF | ISBN: 1138066141 | 236 pages | 2 MB

Surveillance Valley: The Secret Military History of the Internet

Posted By: First1
Surveillance Valley: The Secret Military History of the Internet

Surveillance Valley: The Secret Military History of the Internet by Yasha Levine
English | February 6th, 2018 | ASIN: B072MH6PJQ, ISBN: 1610398025 | 291 pages | EPUB | 2.14 MB

The internet is the most effective weapon the government has ever built.

Network Security

Posted By: AvaxGenius
Network Security

Network Security By Scott C.-H. Huang
English | EPUB | 2010 | 280 Pages | ISBN : 0387738207 | 2.25 MB

This volume highlights and addresses several key challenges in the area of Network Security. Covered is a comprehensive array of topics including secure metering, group key management, denial-of-service attacks, routing and intrusion detection and many more. The book contains eleven peer reviewed chapters, authored by prominent researchers from around the globe. Although the topics do not cover every aspect of network security, they do represent the most fundamental and practical techniques. Network Security should be of interest to researchers and network security experts in the field.

Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)

Posted By: naag
Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)

Wireless Networks, IoT, and Mobile Devices Hacking (The Art of Hacking Series)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5 Hours | 6.75 GB
Genre: eLearning | Language: English

Implementing the ISO/IEC 27001 ISMS Standard, Second Edition

Posted By: readerXXI
Implementing the ISO/IEC 27001 ISMS Standard, Second Edition

Implementing the ISO/IEC 27001 ISMS Standard, Second Edition
by Edward Humphreys
English | 2016 | ISBN: 1608079309 | 239 Pages | PDF | 2.95 MB

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Posted By: lengen
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker by William L. Simon
English | Apr. 24, 2012 | ASIN: 0316037729 | 388 Pages | ePub | 1 MB

Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies–and however fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. He spent years skipping through cyberspace, always three steps ahead and labeled unstoppable. But for Kevin, hacking wasn't just about technological feats-it was an old fashioned confidence game that required guile and deception to trick the unwitting out of valuable information.

Security Testing and Ethical Hacking with Kali Linux

Posted By: naag
Security Testing and Ethical Hacking with Kali Linux

Security Testing and Ethical Hacking with Kali Linux
MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 6.5 Hours | 10.6 GB
Genre: eLearning | Language: English