Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition

    Posted By: IrGens
    Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition

    Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition by Lee Brotherston, Amanda Berlin, William F. Reyor
    English | July 30, 2024 | ISBN: 1098127242 | True PDF | 285 pages | 8.8 MB

    Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition

    Posted By: lucky_aut
    Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition

    Cybersecurity For Dummies (For Dummies (Computer/Tech)), 2nd Edition by Joseph Steinberg
    English | April 26, 2022 | ISBN : 1119867185 | 416 pages | EPUB | 5.9 MB

    Explore the latest developments in cybersecurity with this essential guide

    Mastering Kali Linux for Advanced Penetration Testing (Repost)

    Posted By: AvaxGenius
    Mastering Kali Linux for Advanced Penetration Testing (Repost)

    Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu
    English | EPUB | 2019 | 548 Pages | ISBN : 178934056X | 33.8 MB

    This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.

    Mastering Kali Linux for Advanced Penetration Testing (Repost)

    Posted By: AvaxGenius
    Mastering Kali Linux for Advanced Penetration Testing (Repost)

    Mastering Kali Linux for Advanced Penetration Testing: Secure your network with Kali Linux 2019.1 – the ultimate white hat hackers' toolkit, 3rd Edition by Vijay Kumar Velu
    English | EPUB | 2019 | 548 Pages | ISBN : 178934056X | 33.8 MB

    This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.

    VLSI Design and Test (Repost)

    Posted By: AvaxGenius
    VLSI Design and Test (Repost)

    VLSI Design and Test: 23rd International Symposium, VDAT 2019, Indore, India, July 4–6, 2019, Revised Selected Papers by Anirban Sengupta
    English | PDF | 2019 | 782 Pages | ISBN : 9813297662 | 110.2 MB

    This book constitutes the refereed proceedings of the 23st International Symposium on VLSI Design and Test, VDAT 2019, held in Indore, India, in July 2019.

    Cyber Deception: Building the Scientific Foundation

    Posted By: AvaxGenius
    Cyber Deception: Building the Scientific Foundation

    Cyber Deception: Building the Scientific Foundation by Sushil Jajodia
    English | PDF (True) | 2016 | 314 Pages | ISBN : 331932697X | 9.1 MB

    This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, programming languages, graph theory, and more. The work presented in this book highlights the complex and multi-facted aspects of cyber deception, identifies the new scientific problems that will emerge in the domain as a result of the complexity, and presents novel approaches to these problems.

    The 2017 Gulf Crisis: An Interdisciplinary Approach

    Posted By: AvaxGenius
    The 2017 Gulf Crisis: An Interdisciplinary Approach

    The 2017 Gulf Crisis: An Interdisciplinary Approach by Mahjoob Zweiri
    English | EPUB | 2021 | 348 Pages | ISBN : 9811587345 | 2.8 MB

    This book provides an overview of the origins, repercussions and projected future of the ongoing Gulf crisis, as well as an analysis of the major issues and debates relating to it. The Gulf region witnessed an extraordinary rift when, on 5 June 2017, Saudi Arabia, the United Arab Emirates and Bahrain cut all diplomatic ties and imposed a siege on the State of Qatar following the hacking of the Qatar News Agency website.

    Web Security Basics For Developers: Real Threats, Practical Defense

    Posted By: lucky_aut
    Web Security Basics For Developers: Real Threats, Practical Defense

    Web Security Basics For Developers: Real Threats, Practical Defense by Malcolm McDonald
    English | 21 Jun. 2020 | ISBN : 1593279949 | 270 pages | AZW3 (True/Retail copy) | 4.55 MB

    Troubleshooting with the Windows Sysinternals Tools, 2nd Edition

    Posted By: lucky_aut
    Troubleshooting with the Windows Sysinternals Tools, 2nd Edition

    Troubleshooting with the Windows Sysinternals Tools, 2nd Edition by Mark E. Russinovich, Aaron Margosis
    English | ISBN: 0735684448 | 2016 | True AZW3 | 688 pages | 50.2 MB

    Optimize Windows system reliability and performance with Sysinternals

    Computer Vision – ECCV 2020 Workshops (Repost)

    Posted By: AvaxGenius
    Computer Vision – ECCV 2020 Workshops (Repost)

    Computer Vision – ECCV 2020 Workshops: Glasgow, UK, August 23–28, 2020, Proceedings, Part I by Adrien Bartoli
    English | EPUB | 2020 | 818 Pages | ISBN : 3030664147 | 118.5 MB

    The 5-volume set, comprising the LNCS books 12535 until 12540, constitutes the refereed proceedings of 28 out of the 45 workshops held at the 16th European Conference on Computer Vision, ECCV 2020. The conference was planned to take place in Glasgow, UK, during August 23-28, 2020, but changed to a virtual format due to the COVID-19 pandemic.

    Protektion 4.0: Das Digitalisierungsdilemma (Repost)

    Posted By: AvaxGenius
    Protektion 4.0: Das Digitalisierungsdilemma (Repost)

    Protektion 4.0: Das Digitalisierungsdilemma by Günter Müller
    Deutsch | PDF | 2020 | 253 Pages | ISBN : 3662562618 | 4 MB

    Das Buch beschreibt Datenschutz erstmals als Offenheit (Transparenz) statt Datensparsamkeit. Der Autor beschreibt als Voraussetzung dazu einen Besitztitel auf Daten. Die Umsetzung erfolgt über Big Data, deren Techniken so ausgelegt sind, dass Daten zur „handelbaren“ Ware werden können, indem dokumentierbar wird, wie von wem wozu Daten verwendet worden sind. Transparente Verwendung auch in Hinsicht auf den Nutzen oder die Notwendigkeit statt Verbergen wird als neues Privatheitsmodell vorgeschlagen. Die Synchronisation der Entwicklung von Technik und Gesellschaft steht dabei im Vordergrund. Zahlreiche Fallstudien erhöhen den praktischen Nutzen des Buches.

    Security and Privacy in Social Networks and Big Data (Repost)

    Posted By: AvaxGenius
    Security and Privacy in Social Networks and Big Data (Repost)

    Security and Privacy in Social Networks and Big Data: 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers by Weizhi Meng
    English | PDF | 2019 | 276 Pages | ISBN : 9811507570 | 15.1 MB

    This book constitutes revised and selected papers from the 5th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2019, held in Copenhagen, Denmark, in July 2019.

    Public-Key Cryptography – PKC 2021

    Posted By: AvaxGenius
    Public-Key Cryptography – PKC 2021

    Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II by Juan A. Garay
    English | EPUB | 2021 | 777 Pages | ISBN : 303075247X | 60.8 MB

    The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.

    Silicon Valley Cybersecurity Conference

    Posted By: AvaxGenius
    Silicon Valley Cybersecurity Conference

    Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers by Younghee Park
    English | EPUB | 2021 | 232 Pages | ISBN : 3030727246 | 19.5 MB

    This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format.

    Safety and Security in Hotels and Home Sharing

    Posted By: AvaxGenius
    Safety and Security in Hotels and Home Sharing

    Safety and Security in Hotels and Home Sharing by Chelsea A. Binns
    English | EPUB | 2021 | 101 Pages | ISBN : 3030593053 | 0.5 MB

    This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, laws, and applicable theories – such as defensible space, rational choice, and routine activity theories - to determine how responsibility for crime control and accident prevention in these industries is allotted.This analysis identifies key policy questions about the role of the home sharing hosts and guests in ensuring their own safety and security, which will be of interest to policy makers, researchers and practitioners in criminal justice and law enforcement, as well as those involved in the home sharing and hotel industries.