Tags
Language
Tags

Machine Learning and Big Data Analytics Paradigms: Analysis, Applications and Challenges (Repost)

Posted By: AvaxGenius
Machine Learning and Big Data Analytics Paradigms: Analysis, Applications and Challenges (Repost)

Machine Learning and Big Data Analytics Paradigms: Analysis, Applications and Challenges by Aboul Ella Hassanien
English | EPUB | 2021 | 640 Pages | ISBN : 3030593371 | 109.8 MB

This book is intended to present the state of the art in research on machine learning and big data analytics. The accepted chapters covered many themes including artificial intelligence and data mining applications, machine learning and applications, deep learning technology for big data analytics, and modeling, simulation, and security with big data. It is a valuable resource for researchers in the area of big data analytics and its applications.

Backend development security fundamentals

Posted By: lucky_aut
Backend development security fundamentals

Backend development security fundamentals
Duration: 4h 26m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.9 GB
Genre: eLearning | Language: English

With Java examples mostly

Advances in Network-Based Information Systems (Repost)

Posted By: AvaxGenius
Advances in Network-Based Information Systems (Repost)

Advances in Network-Based Information Systems: The 20th International Conference on Network-Based Information Systems (NBiS-2017) By Leonard Barolli, Tomoya Enokido, Makoto Takizawa
English | PDF | 2017 (2018 Edition) | 1195 Pages | ISBN : 3319655205 | 148.07 MB

This book highlights the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and their applications. It includes the Proceedings of the 20th International Conference on Network-Based Information Systems (NBiS-2017), held on August 24–26, 2017 in Toronto, Canada.

Network Security

Posted By: AvaxGenius
Network Security

Network Security By Scott C.-H. Huang
English | PDF | 2010 | 280 Pages | ISBN : 0387738207 | 3.6 MB

This volume highlights and addresses several key challenges in the area of Network Security. Covered is a comprehensive array of topics including secure metering, group key management, denial-of-service attacks, routing and intrusion detection and many more. The book contains eleven peer reviewed chapters, authored by prominent researchers from around the globe. Although the topics do not cover every aspect of network security, they do represent the most fundamental and practical techniques. Network Security should be of interest to researchers and network security experts in the field.

Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition

Posted By: lucky_aut
Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition

Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition by Joseph Steinberg
English | April 26, 2022 | ISBN : 1119867185 | 416 pages | EPUB | 5.9 MB

Explore the latest developments in cybersecurity with this essential guide

CISM 2020: Managing IT Risk

Posted By: Giorgio1
CISM 2020: Managing IT Risk

CISM 2020: Managing IT Risk
Video: .mp4, 1280x720 | Audio: AAC, 48 kHz, 2ch | Size: 217MB
Genre: eLearning | Language: English | Duration: 1hr 19m

Using on-premises and cloud computing IT environments introduces an element of risk. In this course, you'll explore risk management concepts, including gap analysis and SWOT, as well as strategies to manage risk, such as applying risk treatments and creating a risk register.

CISM 2020: Information Security & Business Process Alignment

Posted By: Giorgio1
CISM 2020: Information Security & Business Process Alignment

CISM 2020: Information Security & Business Process Alignment
Video: .mp4, 1280x720 | Audio: AAC, 48 kHz, 2ch | Size: 217MB
Genre: eLearning | Language: English | Duration: 1hr 13m

Proper IT governance starts with aligning IT solutions with business processes. In this course, you'll explore how to identify the relationship between IT security and business objectives.

Data Mining: The Textbook

Posted By: AvaxGenius
Data Mining: The Textbook

Data Mining: The Textbook by Charu C. Aggarwal
English | PDF(True) | 2015 | 746 Pages | ISBN : 3319141414 | 16.4 MB

This textbook explores the different aspects of data mining from the fundamentals to the complex data types and their applications, capturing the wide diversity of problem domains for data mining issues. It goes beyond the traditional focus on data mining problems to introduce advanced data types such as text, time series, discrete sequences, spatial data, graph data, and social networks. Until now, no single book has addressed all these topics in a comprehensive and integrated way.

Master PowerShell 7 on Microsoft Azure

Posted By: lucky_aut
Master PowerShell 7 on Microsoft Azure

Master PowerShell 7 on Microsoft Azure
Duration: 3h 53m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 1.18 GB
Genre: eLearning | Language: English

Mastering Kali Linux for Advanced Penetration Testing (Repost)

Posted By: AvaxGenius
Mastering Kali Linux for Advanced Penetration Testing (Repost)

Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu
English | EPUB | 2019 | 548 Pages | ISBN : 178934056X | 33.8 MB

This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.

Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition (Repost)

Posted By: AvaxGenius
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition (Repost)

Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition by Preston Miller
English | PDF,EPUB | 2019 | 471 Pages | ISBN : 1789341698 | 14.4 MB

Digital forensics plays an integral role in solving complex cybercrimes and helping organizations make sense of cybersecurity incidents. This second edition of Learning Python for Forensics illustrates how Python can be used to support these digital investigations and permits the examiner to automate the parsing of forensic artifacts to spend more time examining actionable data.

Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition (Repost)

Posted By: AvaxGenius
Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition (Repost)

Learning Python for Forensics: Leverage the power of Python in forensic investigations, 2nd Edition by Preston Miller
English | PDF,EPUB | 2019 | 471 Pages | ISBN : 1789341698 | 14.4 MB

Digital forensics plays an integral role in solving complex cybercrimes and helping organizations make sense of cybersecurity incidents. This second edition of Learning Python for Forensics illustrates how Python can be used to support these digital investigations and permits the examiner to automate the parsing of forensic artifacts to spend more time examining actionable data.

Mastering Kali Linux for Advanced Penetration Testing (Repost)

Posted By: AvaxGenius
Mastering Kali Linux for Advanced Penetration Testing (Repost)

Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu
English | EPUB | 2019 | 548 Pages | ISBN : 178934056X | 33.8 MB

This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.

Advanced Informatics for Computing Research (Repost)

Posted By: AvaxGenius
Advanced Informatics for Computing Research (Repost)

Advanced Informatics for Computing Research: 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I by Ashish Kumar Luhach
English | PDF | 2021 | 698 Pages | ISBN : 9811636591 | 108.9 MB

This two-volume set (CCIS 1393 and CCIS 1394) constitutes selected and revised papers of the 4th International Conference on Advanced Informatics for Computing Research, ICAICR 2020, held in Gurugram, India, in December 2020.

Hardware IP Security and Trust (Repost)

Posted By: AvaxGenius
Hardware IP Security and Trust (Repost)

Hardware IP Security and Trust by Prabhat Mishra
English | EPUB | 2017 | 351 Pages | ISBN : 3319490249 | 5.8 MB

This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP can be compromised at various stages in the overall SoC design-fabrication-deployment cycle. Readers will gain a comprehensive understanding of the security vulnerabilities of different types of IPs.