Tags
Language
Tags
Buy Bitcoin With Credit Card Instantly!
Bitcoin Recovers! Be quick!

Buy Bitcoin With Credit Card Instantly!


CEX.IO is a secure, regulated, and licensed cryptocurrency exchange.
The exchange supports 100+ cryptocurrencies, including
Bitcoin, Ethereum, and other popular assets.

Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition

Posted By: lucky_aut
Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition

Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition by Joseph Steinberg
English | April 26, 2022 | ISBN : 1119867185 | 416 pages | EPUB | 5.9 MB

Explore the latest developments in cybersecurity with this essential guide

Mastering Kali Linux for Advanced Penetration Testing (Repost)

Posted By: AvaxGenius
Mastering Kali Linux for Advanced Penetration Testing (Repost)

Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu
English | EPUB | 2019 | 548 Pages | ISBN : 178934056X | 33.8 MB

This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.

Mastering Kali Linux for Advanced Penetration Testing (Repost)

Posted By: AvaxGenius
Mastering Kali Linux for Advanced Penetration Testing (Repost)

Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu
English | EPUB | 2019 | 548 Pages | ISBN : 178934056X | 33.8 MB

This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.

VLSI Design and Test (Repost)

Posted By: AvaxGenius
VLSI Design and Test (Repost)

VLSI Design and Test: 23rd International Symposium, VDAT 2019, Indore, India, July 4–6, 2019, Revised Selected Papers by Anirban Sengupta
English | PDF | 2019 | 782 Pages | ISBN : 9813297662 | 110.2 MB

This book constitutes the refereed proceedings of the 23st International Symposium on VLSI Design and Test, VDAT 2019, held in Indore, India, in July 2019.

Cyber Deception: Building the Scientific Foundation

Posted By: AvaxGenius
Cyber Deception: Building the Scientific Foundation

Cyber Deception: Building the Scientific Foundation by Sushil Jajodia
English | PDF (True) | 2016 | 314 Pages | ISBN : 331932697X | 9.1 MB

This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.

The 2017 Gulf Crisis: An Interdisciplinary Approach

Posted By: AvaxGenius
The 2017 Gulf Crisis: An Interdisciplinary Approach

The 2017 Gulf Crisis: An Interdisciplinary Approach by Mahjoob Zweiri
English | EPUB | 2021 | 348 Pages | ISBN : 9811587345 | 2.8 MB

This book provides an overview of the origins, repercussions and projected future of the ongoing Gulf crisis, as well as an analysis of the major issues and debates relating to it. The Gulf region witnessed an extraordinary rift when, on 5 June 2017, Saudi Arabia, the United Arab Emirates and Bahrain cut all diplomatic ties and imposed a siege on the State of Qatar following the hacking of the Qatar News Agency website.

Web Security Basics For Developers: Real Threats, Practical Defense

Posted By: lucky_aut
Web Security Basics For Developers: Real Threats, Practical Defense

Web Security Basics For Developers: Real Threats, Practical Defense by Malcolm McDonald
English | 21 Jun. 2020 | ISBN : 1593279949 | 270 pages | AZW3 (True/Retail copy) | 4.55 MB

Troubleshooting with the Windows Sysinternals Tools, 2nd Edition

Posted By: lucky_aut
Troubleshooting with the Windows Sysinternals Tools, 2nd Edition

Troubleshooting with the Windows Sysinternals Tools, 2nd Edition by Mark E. Russinovich, Aaron Margosis
English | ISBN: 0735684448 | 2016 | True AZW3 | 688 pages | 50.2 MB

Optimize Windows system reliability and performance with Sysinternals

Computer Vision – ECCV 2020 Workshops (Repost)

Posted By: AvaxGenius
Computer Vision – ECCV 2020 Workshops (Repost)

Computer Vision – ECCV 2020 Workshops: Glasgow, UK, August 23–28, 2020, Proceedings, Part I by Adrien Bartoli
English | EPUB | 2020 | 818 Pages | ISBN : 3030664147 | 118.5 MB

The 5-volume set, comprising the LNCS books 12535 until 12540, constitutes the refereed proceedings of 28 out of the 45 workshops held at the 16th European Conference on Computer Vision, ECCV 2020. The conference was planned to take place in Glasgow, UK, during August 23-28, 2020, but changed to a virtual format due to the COVID-19 pandemic.

Protektion 4.0: Das Digitalisierungsdilemma (Repost)

Posted By: AvaxGenius
Protektion 4.0: Das Digitalisierungsdilemma (Repost)

Protektion 4.0: Das Digitalisierungsdilemma by Günter Müller
Deutsch | PDF | 2020 | 253 Pages | ISBN : 3662562618 | 4 MB

Das Buch beschreibt Datenschutz erstmals als Offenheit (Transparenz) statt Datensparsamkeit. Der Autor beschreibt als Voraussetzung dazu einen Besitztitel auf Daten. Die Umsetzung erfolgt über Big Data, deren Techniken so ausgelegt sind, dass Daten zur „handelbaren“ Ware werden können, indem dokumentierbar wird, wie von wem wozu Daten verwendet worden sind. Transparente Verwendung auch in Hinsicht auf den Nutzen oder die Notwendigkeit statt Verbergen wird als neues Privatheitsmodell vorgeschlagen. Die Synchronisation der Entwicklung von Technik und Gesellschaft steht dabei im Vordergrund. Zahlreiche Fallstudien erhöhen den praktischen Nutzen des Buches.

Security and Privacy in Social Networks and Big Data (Repost)

Posted By: AvaxGenius
Security and Privacy in Social Networks and Big Data (Repost)

Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers by Weizhi Meng
English | PDF | 2019 | 276 Pages | ISBN : 9811507570 | 15.1 MB

This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019.

Public-Key Cryptography – PKC 2021

Posted By: AvaxGenius
Public-Key Cryptography – PKC 2021

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II by Juan A. Garay
English | EPUB | 2021 | 777 Pages | ISBN : 303075247X | 60.8 MB

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.

Silicon Valley Cybersecurity Conference

Posted By: AvaxGenius
Silicon Valley Cybersecurity Conference

Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers by Younghee Park
English | EPUB | 2021 | 232 Pages | ISBN : 3030727246 | 19.5 MB

This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format.

Safety and Security in Hotels and Home Sharing

Posted By: AvaxGenius
Safety and Security in Hotels and Home Sharing

Safety and Security in Hotels and Home Sharing by Chelsea A. Binns
English | EPUB | 2021 | 101 Pages | ISBN : 3030593053 | 0.5 MB

This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, laws, and applicable theories – such as defensible space, rational choice, and routine activity theories - to determine how responsibility for crime control and accident prevention in these industries is allotted.This analysis identifies key policy questions about the role of the home sharing hosts and guests in ensuring their own safety and security, which will be of interest to policy makers, researchers and practitioners in criminal justice and law enforcement, as well as those involved in the home sharing and hotel industries.

Financial Security in China: Situation Analysis and System Design (Repost)

Posted By: AvaxGenius
Financial Security in China: Situation Analysis and System Design (Repost)

Financial Security in China: Situation Analysis and System Design By Dexu He
English | PDF | 2016 | 235 Pages | ISBN : 9811009678 | 2.8 MB

This book studies typical issues regarding China’s financial security, such as internal and external currency security, herd behavior in bank credit, system risk in the stock market, major risks in the insurance industry, risks related to shadow banking, and real-estate finance security. The book reflects the author’s longtime research experience and personal thought. It uses a completely new structure to present useful and targeted-based countermeasures and suggestions, making it a valuable reference resource for those involved in solving China’s financial security problems and creating China’s future financial security system. It is highly recommended for readers who want to understand the current situation and features of China’s financial security.