Tags
Language
Tags
May 2024
Su Mo Tu We Th Fr Sa
28 29 30 1 2 3 4
5 6 7 8 9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30 31 1

Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security Professionals (Repost)

Posted By: step778
Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security Professionals (Repost)

Y. Anto, "Ultimate Hackers Training Kit: For Ethical Hackers and Cyber Security Professionals"
English | 2012 | pages: 153 | ISBN: 3659235555 | PDF | 7,6 mb

Moodle 4 Security: Enhance security, regulation, and compliance within your Moodle infrastructure

Posted By: yoyoloit
Moodle 4 Security: Enhance security, regulation, and compliance within your Moodle infrastructure

Moodle 4 Security
by Ian Wild

English | 2024 | ISBN: 1804611662 | 288 pages | True PDF EPUB | 30.03 MB

Information Systems Security

Posted By: AvaxGenius
Information Systems Security

Information Systems Security: 19th International Conference, ICISS 2023, Raipur, India, December 16–20, 2023, Proceedings by Vallipuram Muthukkumarasamy, Sithu D. Sudarsan, Rudrapatna K. Shyamasundar
English | PDF (True) | 2024 | 496 Pages | ISBN : 3031490983 | 30.2 MB

This book constitutes the refereed proceedings of the19th International Conference on Information Systems Security, ICISS 2023, held in Raipur, India, during December 16–20, 2023. The 18 full papers and 10 short papers included in this book were carefully reviewed and selected from 78 submissions. They are organized in topical sections as follows: systems security, network security, security in AI/ML, privacy, cryptography, blockchains.

Computational Science and Its Applications – ICCSA 2020 (Repost)

Posted By: AvaxGenius
Computational Science and Its Applications – ICCSA 2020 (Repost)

Computational Science and Its Applications – ICCSA 2020: 20th International Conference, Cagliari, Italy, July 1–4, 2020, Proceedings, Part III by Osvaldo Gervasi
English | PDF | 2020 | 1062 Pages | ISBN : 3030588076 | 172.4 MB

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event.

Emerging Technologies for Computing, Communication and Smart Cities (Repost)

Posted By: AvaxGenius
Emerging Technologies for Computing, Communication and Smart Cities (Repost)

Emerging Technologies for Computing, Communication and Smart Cities: Proceedings of ETCCS 2021 by Pradeep Kumar Singh
English | PDF,EPUB | 2022 | 777 Pages | ISBN : 9811902836 | 107 MB

This book presents best selected papers presented at the Second International Conference on Emerging Technologies for Computing, Communication and Smart Cities (ETCCS 2021) held on 21-22 August 2021 at BFCET, Punjab, India. IEI India members supported externally. It is co-organized by Southern Federal University, Russia; University of Jan Wyżykowski (UJW), Polkowice, Poland, SD College of Engineering & Technology, Muzaffarnagar Nagar, India as an academic partner and CSI, India for technical support. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.

Non-Functional Requirements in Software Engineering

Posted By: AvaxGenius
Non-Functional Requirements in Software Engineering

Non-Functional Requirements in Software Engineering by Lawrence Chung , Brian A. Nixon , Eric Yu , John Mylopoulos
English | PDF | 2000 | 458 Pages | ISBN : 0792386663 | 37.4 MB

Non-Functional Requirements in Software Engineering presents a systematic and pragmatic approach to `building quality into' software systems. Systems must exhibit software quality attributes, such as accuracy, performance, security and modifiability. However, such non-functional requirements (NFRs) are difficult to address in many projects, even though there are many techniques to meet functional requirements in order to provide desired functionality. This is particularly true since the NFRs for each system typically interact with each other, have a broad impact on the system and may be subjective.

Burp Suite Cookbook: Web application security made easy with Burp Suite, 2nd Edition

Posted By: yoyoloit
Burp Suite Cookbook: Web application security made easy with Burp Suite, 2nd Edition

Burp Suite Cookbook
by Wear, Sunny;

English | 2023 | ISBN: 183508107X | 450 pages | True PDF | 107.53 MB

Cybersecurity Architecture Fundamentals

Posted By: sammoh
Cybersecurity Architecture Fundamentals

Cybersecurity Architecture Fundamentals
MP4 | Video: AVC 1920 x 1080 | Audio: AAC 44 Khz 2ch | Duration: 03:03:19 | 2.09 GB

This course provides a comprehensive overview of cybersecurity architecture, equipping students with the knowledge and skills needed to design and implement robust security solutions. The curriculum covers fundamental concepts and delves into practical aspects, enabling students to assess security risks, develop effective security controls, and apply security design patterns to real-world scenarios.

Human-Computer Interaction. Interaction in Context (Repost)

Posted By: AvaxGenius
Human-Computer Interaction. Interaction in Context (Repost)

Human-Computer Interaction. Interaction in Context: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II by Masaaki Kurosu
English | PDF | 2018 | 671 Pages | ISBN : 3319912437 | 118 MB

The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018.
The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions.

The Geopolitics of Red Oil: Constructing the China threat through energy security

Posted By: roxul
The Geopolitics of Red Oil: Constructing the China threat through energy security

Andrew Stephen Campion, "The Geopolitics of Red Oil: Constructing the China threat through energy security "
English | ISBN: 1138351512 | 2018 | 186 pages | EPUB | 754 KB

Proceedings of International Conference on Recent Trends in Computing: ICRTC 2022

Posted By: AvaxGenius
Proceedings of International Conference on Recent Trends in Computing: ICRTC 2022

Proceedings of International Conference on Recent Trends in Computing: ICRTC 2022 by Rajendra Prasad Mahapatra, Sateesh K. Peddoju, Sudip Roy, Pritee Parwekar
English | EPUB (True) | 2023 | 837 Pages | ISBN : 9811988242 | 130.4 MB

This book is a collection of high-quality peer-reviewed research papers presented at International Conference on Recent Trends in Computing (ICRTC 2022) held at SRM Institute of Science and Technology, Ghaziabad, Delhi, India, during 3 – 4 June 2022. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. The book presents original works from researchers from academic and industry in the field of networking, security, big data and the Internet of things.

Smart Grid and Internet of Things

Posted By: AvaxGenius
Smart Grid and Internet of Things

Smart Grid and Internet of Things: 6th EAI International Conference, SGIoT 2022, TaiChung, Taiwan, November 19-20, 2022, Proceedings by Der-Jiunn Deng, Han-Chieh Chao, Jyh-Cheng Chen
English | PDF EPUB | 2023 | 392 Pages | ISBN : 3031312740 | 76.2 MB

This book constitutes the refereed proceedings of the 6th EAI International Conference on Smart Grid and Internet of Things, SGIoT 2022, held in TaiChung, Taiwan, in November 19-20, 2022.
The 33 regular papers presented were carefully reviewed and selected from 96 submissions. The papers cover a broad range of topics in wireless sensor, vehicular ad hoc networks, security, deep learning and big data. The papers are organized in subject areas as follows: IoT, Communication Security, Data Mining or Big Data; Artificial Intelligence, Machine Leaning, Deep Learning and Neural Network; WLAN, Wireless Internet and 5G; Protocol, Algorithm, Services and Applications.

How to Measure Anything in Cybersecurity Risk, 2nd Edition

Posted By: yoyoloit
How to Measure Anything in Cybersecurity Risk, 2nd Edition

How to Measure Anything in Cybersecurity Risk
by Hubbard, Douglas W.;Seiersen, Richard;

English | 2023 | ISBN: ‎ 1119892309 | 366 pages | True PDF EPUB | 11.98 MB

Computational Science and Its Applications – ICCSA 2020 (Repost)

Posted By: AvaxGenius
Computational Science and Its Applications – ICCSA 2020 (Repost)

Computational Science and Its Applications – ICCSA 2020: 20th International Conference, Cagliari, Italy, July 1–4, 2020, Proceedings, Part V by Osvaldo Gervasi
English | PDF | 2020 | 812 Pages | ISBN : 3030588130 | 146.5 MB

The seven volumes LNCS 12249-12255 constitute the refereed proceedings of the 20th International Conference on Computational Science and Its Applications, ICCSA 2020, held in Cagliari, Italy, in July 2020. Due to COVID-19 pandemic the conference was organized in an online event.

An Ethical Guide to Cyber Anonymity: Concepts, tools and techniques to protect your anonymity from criminals, unethical hackers

Posted By: yoyoloit
An Ethical Guide to Cyber Anonymity: Concepts, tools and techniques to protect your anonymity from criminals, unethical hackers

An Ethical Guide to Cyber Anonymity
by Gunawardana, Kushantha;

English | 2022 | ISBN: ‎ 1801810214 | 322 pages | True PDF | 41.72 MB