Subcategories

CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Posted By: libr
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

CEH v9: Certified Ethical Hacker Version 9 Practice Tests by Raymond Blockmon
English | 2016 | ISBN: 1119252156 | 192 pages | EPUB | 3,3 MB

Vulnerability, Uncertainity, and Risk [Repost]

Posted By: tanas.olesya
Vulnerability, Uncertainity, and Risk [Repost]

Vulnerability, Uncertainity, and Risk: Analysis, Modeling, and Management by Bilal M. Ayyub
English | 30 Apr. 2011 | ISBN: 0784411700 | 1018 Pages | PDF | 40 MB

These papers demonstrate the transformation of intellectual discussions into robust frameworks for handling emerging vulnerabilities and risks and providing analytical bases to prepare for national and international disasters.

Network and System Security

Posted By: tanas.olesya
Network and System Security

Network and System Security (Lecture Notes in Computer Science) by Li Xu
English | 5 Oct. 2012 | ISBN: 3642346006 | 548 Pages | PDF | 9 MB

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from

Serial Murderers and Their Victims [Repost]

Posted By: tanas.olesya
Serial Murderers and Their Victims [Repost]

Serial Murderers and Their Victims by Dr Eric W Hickey
English | 5 Apr. 2009 | ISBN: 0495600814 | 449 Pages | PDF | 2 MB

This text provides an in-depth, scholarly, and broad-based examination of serial murderers and their victims. The coverage is supported by extensive data and research, and it profiles some of the most prominent murderers of our time.

Best Internet Links

Posted By: Alex

Complexity and Cryptography [Repost]

Posted By: tanas.olesya
Complexity and Cryptography [Repost]

Complexity and Cryptography: An Introduction by John Talbot
English | 12 Jan. 2006 | ISBN: 0521617715, 0521852315 | 304 Pages | PDF | 3 MB

Cryptography plays a crucial role in many aspects of today's world, from internet banking and ecommerce to email and web-based business processes.

ITPro.TV - Certified Ethical Hacker CEH v9

Posted By: FenixN
ITPro.TV - Certified Ethical Hacker CEH v9

ITPro.TV - Certified Ethical Hacker CEH v9
HDRips | MP4/AVC, ~3409 kb/s | 1920x1076 | Duration: 33:37:36 | English: AAC, 256 kb/s (2 ch) | 42.9 GB
Genre: Development / Programming / Security

EC-Council's Ethical Hacking and Countermeasures (CEH) covers concepts and tools related to exploiting systems, networks, devices and operating platforms. This includes hacking concepts such as vulnerability assessment, network intrusion, reverse engineering, defacing websites, damaging network appliances, launching distributed denial-of-service attacks, massive worm propagation, breaking passwords, brute-forcing authentication systems, cracking encryption, exploiting systems, advance viruses, Trojans, and other malware. This certificate is targeted at site administrators, security professionals, auditors and anyone who is concerned about the integrity of the network infrastructure.

Principles of Information Security, 5th Edition

Posted By: sasha82
Principles of Information Security, 5th Edition

Principles of Information Security, 5th Edition by Michael E. Whitman, Herbert J. Mattord
November 18, 2014 | ISBN: 1285448367 | English | 656 pages | PDF | 15 MB

Security and Privacy in Communication Networks (repost)

Posted By: interes
Security and Privacy in Communication Networks (repost)

Security and Privacy in Communication Networks by Sushil Jajodia and Jianying Zhou
English | 2010 | ISBN: 364216160X | 500 pages | PDF | 7,7 MB

CISSP All-in-One Exam Guide, 7th Edition (repost)

Posted By: Willson
CISSP All-in-One Exam Guide, 7th Edition (repost)

Shon Harris, Fernando Maymi, "CISSP All-in-One Exam Guide, 7th Edition"
English | 2016 | ISBN: 0071849270 | 1456 pages | PDF | 108 MB

Governance and Security Issues of the European Union: Challenges Ahead

Posted By: sasha82
Governance and Security Issues of the European Union: Challenges Ahead

Governance and Security Issues of the European Union: Challenges Ahead by Jaap de Zwaan, Martijn Lak, Abiola Makinwa, Piet Willems
2016 | ISBN: 9462651434 | English | 353 pages | PDF | 3 MB

The Agrochemical and Pesticides Safety Handbook [Repost]

Posted By: tanas.olesya
The Agrochemical and Pesticides Safety Handbook [Repost]

The Agrochemical and Pesticides Safety Handbook: The Detailed Description by Michael F. Waxman
English | 22 May 1998 | ISBN: 1566702968 | 380 Pages | PDF | 25 MB

Worldwide, there are a vast array of agricultural pesticides and chemicals used to eliminate pests and to protect health, food, and fiber. The safe handling, usage, and disposal of these chemicals and pesticides is of vital importance.

Facing Cyber Threats Head On: Protecting Yourself and Your Business [Audiobook]

Posted By: IrGens
Facing Cyber Threats Head On: Protecting Yourself and Your Business [Audiobook]

Facing Cyber Threats Head On: Protecting Yourself and Your Business [Audiobook] by Brian Minick
English | January 16, 2017 | ASIN: B01MT6IB6O, ISBN: 1536649279, 1536649260 | MP3@64 kbps | 5 hrs 9 mins | 142 MB
Narrator: Patrick Lawlor

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Posted By: IrGens
Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier
English | March 2, 2015 | ISBN: 039335217X, 0393244814 | AZW3 | 400 pages | 0.9 MB

Prestashop : développer ses propres modules e-commerce

Posted By: ALGEROIS
Prestashop : développer ses propres modules e-commerce

Prestashop : développer ses propres modules e-commerce
Eyrolles | Septembre 2016 | ISBN: 2212141920 | French | PDF | 232 Pages | 36 MB

Udemy - The Complete Cyber Security Course - Endpoint Protection (2017)

Posted By: house23
Udemy - The Complete Cyber Security Course - Endpoint Protection (2017)

Udemy - The Complete Cyber Security Course - Endpoint Protection (2017)
MP4 | AVC 209kbps | English | 1280x720 | 30fps | 16h 30mins | AAC stereo 189kbps | 2.83 GB
Genre: Video Training

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more. On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now! Go from a beginner to advanced in this easy to follow expert course.