Subcategories

Walking Wounded: Inside the U.S. Cyberwar Machine

Posted By: step778
Walking Wounded: Inside the U.S. Cyberwar Machine

Dr. Michael A. VanPutte, Peiter 'Mudge' Zatko, "Walking Wounded: Inside the U.S. Cyberwar Machine"
English | 2016 | pages: 230 | ISBN: 1539945618 | EPUB | 1,5 mb

Il Manifesto per una nuova Internet

Posted By: hill0
Il Manifesto per una nuova Internet

Il Manifesto per una nuova Internet: Riconoscere, difendersi e sovvertire il capitalismo della sorveglianza
by Alessandro Celz

Italiano | 2020 | ASIN: B08PCR7WYY | 152 Pages | EPUB | 12 MB

Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition

Posted By: sasha82
Security Engineering: A Guide to Building Dependable Distributed Systems, 3rd Edition

Security Engineering: A Guide to Building Dependable Distributed Systems 3rd Edition by Ross Anderson
December 22, 2020 | ISBN: 1119642787 | English | 1232 pages | PDF | 8 MB

LATIN 2020: Theoretical Informatics

Posted By: AvaxGenius
LATIN 2020: Theoretical Informatics

LATIN 2020: Theoretical Informatics: 14th Latin American Symposium, São Paulo, Brazil, January 5-8, 2021, Proceedings by Yoshiharu Kohayakawa
English | PDF | 2020 | 653 Pages | ISBN : 3030617912 | 24.8 MB

This book constitutes the refereed proceedings of the 14th Latin American Symposium on Theoretical Informatics, LATIN 2020, held in Sao Paulo, Brazil, in January 2021.

Learning Azure Network Security

Posted By: lucky_aut
Learning Azure Network Security

Learning Azure Network Security
Duration: 1h 20m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 137 MB
Genre: eLearning | Language: English

Microsoft lists over 600 services offered by Azure, its popular cloud computing service. A key component across the hundreds of Azure services is, of course, security.

Enterprise Security for the Executive: Setting the Tone from the Top

Posted By: interes
Enterprise Security for the Executive: Setting the Tone from the Top

Enterprise Security for the Executive: Setting the Tone from the Top by Jennifer Bayuk
English | 2009 | ISBN: 0313376603 | 163 pages | PDF | 2,4 MB

Security in Ad-hoc and Sensor Networks

Posted By: interes
Security in Ad-hoc and Sensor Networks

Security in Ad-hoc and Sensor Networks (Computer and Network Security) by Raheem Beyah, Janise Mcnair and Cherita Corbett
English | 2009 | ISBN: 981427108X | 460 pages | PDF | 5,4 MB

The Element Encyclopedia of Secret Societies and Hidden History

Posted By: Free butterfly
The Element Encyclopedia of Secret Societies and Hidden History

The Element Encyclopedia of Secret Societies and Hidden History by HarperCollins Publishers
English | July 1, 2006 | ISBN: 0007220685 | 704 pages | PDF | 2.27 Mb

The Puzzle Palace: A Report on NSA, America's Most Secret Agency

Posted By: Free butterfly
The Puzzle Palace: A Report on NSA, America's Most Secret Agency

The Puzzle Palace: A Report on NSA, America's Most Secret Agency by Houghton Mifflin Harcourt
English | June 5, 2018 | ISBN: N/A | ASIN: B07D6ZMXC7 | 600 pages | EPUB | 0.85 Mb

A Brief History of Cryptology and Cryptographic Algorithms

Posted By: AvaxGenius
A Brief History of Cryptology and Cryptographic Algorithms

A Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley
English | PDF,EPUB(Repost) | 2013 | 104 Pages | ISBN : 331901627X | 4.8 MB

The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”.

Computer Vision – ECCV 2020

Posted By: AvaxGenius
Computer Vision – ECCV 2020

Computer Vision – ECCV 2020: 16th European Conference, Glasgow, UK, August 23–28, 2020, Proceedings, Part III by Andrea Vedaldi
English | PDF | 2020 | 830 Pages | ISBN : 3030585794 | 197.5 MB

The 30-volume set, comprising the LNCS books 12346 until 12375, constitutes the refereed proceedings of the 16th European Conference on Computer Vision, ECCV 2020, which was planned to be held in Glasgow, UK, during August 23-28, 2020. The conference was held virtually due to the COVID-19 pandemic.

CCISO Certified Chief Information Security Officer All-in-One Exam Guide

Posted By: First1
CCISO Certified Chief Information Security Officer All-in-One Exam Guide

CCISO Certified Chief Information Security Officer All-in-One Exam Guide by Steve Bennett, Jordan Genung
English | December 2nd, 2020 | ISBN: 1260463923 | 400 pages | EPUB (True/Retail Copy) | 8.89 MB

100% coverage of every objective for the EC-Council's Certified Chief Information Security Officer exam

Testing Software and Systems

Posted By: AvaxGenius
Testing Software and Systems

Testing Software and Systems: 32nd IFIP WG 6.1 International Conference, ICTSS 2020, Naples, Italy, December 9–11, 2020, Proceedings by Valentina Casola
English | PDF | 2020 | 321 Pages | ISBN : 303064880X | 20.7 MB

This book constitutes the refereed proceedings of the 32nd IFIP WG 6.1 International Conference on Testing Software and Systems, ICTSS 2020, which was supposed to be held in Naples, Italy, in December 2020, but was held virtually due to the COVID-19 pandemic.

Fundamentals of Computer Networking

Posted By: lucky_aut
Fundamentals of Computer Networking

Fundamentals of Computer Networking
Duration: 2h 11m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.04 GB
Genre: eLearning | Language: English

LAN, WAN, PAN, Wireless Networks, Network Media, Network Topology, Switch, Hub, Router, Server, Communication Protocols

Artificial Intelligence, Cybersecurity and Cyber Defence

Posted By: hill0
Artificial Intelligence, Cybersecurity and Cyber Defence

Artificial Intelligence, Cybersecurity and Cyber Defence
by Daniel Ventre

English | 2020 | ISBN: 1786304678 | 255 Pages | PDF | 9 MB