Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Cybersecurity: Securing Information in a Globally Distributed Economy

    Posted By: lucky_aut
    Cybersecurity: Securing Information in a Globally Distributed Economy

    Cybersecurity: Securing Information in a Globally Distributed Economy
    Released: 06/2025
    Duration: 1h 15m 52s | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 235.10 MB
    Genre: eLearning | Language: English

    Advances in Security, Networks, and Internet of Things (Repost)

    Posted By: AvaxGenius
    Advances in Security, Networks, and Internet of Things (Repost)

    Advances in Security, Networks, and Internet of Things: Proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20 by Kevin Daimi, Hamid R. Arabnia, Leonidas Deligiannidis, Min-Shiang Hwang, Fernando G. Tinetti
    English | PDF,EPUB | 2021 | 854 Pages | ISBN : 3030710165 | 116.5 MB

    The book presents the proceedings of four conferences: The 19th International Conference on Security & Management (SAM'20), The 19th International Conference on Wireless Networks (ICWN'20), The 21st International Conference on Internet Computing & Internet of Things (ICOMP'20), and The 18th International Conference on Embedded Systems, Cyber-physical Systems (ESCS'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020. The conferences are part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students.

    Information Security Governance using Artificial Intelligence of Things in Smart Environments

    Posted By: yoyoloit
    Information Security Governance using Artificial Intelligence of Things in Smart Environments

    Information Security Governance Using Artificial Intelligence of Things in Smart Environments
    by Ouaissa, Mariyam;Ouaissa, Mariya;Hidar, Tarik;Sachan, Ram Chandra;Mittal, Akhil;Poddar, Sanjay;, Mariya Ouaissa, Tarik Hidar, Ram Chandra Sachan, Akhil Mittal, Sanjay Poddar

    English | 2026 | ISBN: 1032998148 | 294 pages | True EPUB | 10.82 MB

    Information Security and Privacy Quick Reference

    Posted By: hill0
    Information Security and Privacy Quick Reference

    Information Security and Privacy Quick Reference:
    The Essential Handbook for Every CISO, CSO, and Chief Privacy Officer

    English | 2025 | ISBN: 1394353316 | 303 Pages | PDF | 2 MB

    Information Security A-Z: Cyber Security Bootcamp

    Posted By: lucky_aut
    Information Security A-Z: Cyber Security Bootcamp

    Information Security A-Z: Cyber Security Bootcamp
    Last updated 7/2024
    Duration: 12h 25m | .MP4 1920x1080, 30 fps(r) | AAC, 44100 Hz, 2ch | 2.77 GB
    Genre: eLearning | Language: English

    Become an expert in ISO/IEC 27001, Risk Management, Cryptography, Cyber Forensics, Malware & clear your "Interview"!

    ISO/IEC 27002:2022. Information security controls

    Posted By: lucky_aut
    ISO/IEC 27002:2022. Information security controls

    ISO/IEC 27002:2022. Information security controls
    Last updated 2/2025
    Duration: 6h 51m | .MP4 1920x1080, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.81 GB
    Genre: eLearning | Language: English

    Understand the information security controls for an ISMS that meets the requirements of ISO/IEC 27001:2022

    Information Security Management Principles (4th Edition)

    Posted By: hill0
    Information Security Management Principles (4th Edition)

    Information Security Management Principles
    English | 2024 | ISBN: 1780176937 | 529 Pages | EPUB | 17 MB

    Intelligent Computing Theories and Application (Repost)

    Posted By: AvaxGenius
    Intelligent Computing Theories and Application (Repost)

    Intelligent Computing Theories and Application: 17th International Conference, ICIC 2021, Shenzhen, China, August 12–15, 2021, Proceedings, Part I by De-Shuang Huang
    English | EPUB | 2021 | 913 Pages | ISBN : 3030845214 | 137.8 MB

    This two-volume set of LNCS 12836 and LNCS 12837 constitutes - in conjunction with the volume LNAI 12838 - the refereed proceedings of the 17th International Conference on Intelligent Computing, ICIC 2021, held in Shenzhen, China in August 2021. The 192 full papers of the three proceedings volumes were carefully reviewed and selected from 458 submissions.

    Neural Information Processing (Repost)

    Posted By: AvaxGenius
    Neural Information Processing (Repost)

    Neural Information Processing: 24th International Conference, ICONIP 2017, Guangzhou, China, November 14-18, 2017, Proceedings, Part III By Derong Liu
    English | PDF | 2017 | 953 Pages | ISBN : 3319700898 | 207.7 MB

    The six volume set LNCS 10634, LNCS 10635, LNCS 10636, LNCS 10637, LNCS 10638, and LNCS 10639 constitues the proceedings of the 24rd International Conference on Neural Information Processing, ICONIP 2017, held in Guangzhou, China, in November 2017. The 563 full papers presented were carefully reviewed and selected from 856 submissions.

    Informationssicherheit Grundlagen

    Posted By: IrGens
    Informationssicherheit Grundlagen

    Informationssicherheit Grundlagen
    .MP4, AVC, 1280x720, 30 fps | Deutsch, AAC, 2 Ch | 1 Std. 43 Min. | 628 MB
    Trainer:innen: Asiye Öztürk, Erfan Koza

    Information Security Management: Compliance Audits

    Posted By: IrGens
    Information Security Management: Compliance Audits

    Information Security Management: Compliance Audits
    .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 3m | 837 MB
    Instructor: Christopher Rees

    Enigma Myth Deciphered

    Posted By: hill0
    Enigma Myth Deciphered

    Enigma Myth Deciphered: Codebreakers, Commanders and Politicians
    English | 2025 | ISBN: 3031654749 | 509 Pages | PDF (True) | 15 MB

    Information Security: Opportunities and Limitations

    Posted By: AvaxGenius
    Information Security: Opportunities and Limitations

    Information Security: Opportunities and Limitations by Thomas Liedtke
    English | PDF EPUB (True) | 2024 | 219 Pages | ISBN : 3658457104 | 7.3 MB

    This book explains the most important technical terms and contents and assigns them to the corresponding areas. It also includes seemingly peripheral areas that play a role in information security. For instance, the topic complexes of functional Safety and Privacy are examined in terms of their similarities and differences. The book presents currently used attack patterns and how to protect against them. Protection must be implemented on both a technical level (e.g., through the use of cryptography) and on an organizational and personnel level (e.g., through appropriate management systems and awareness training). How can one determine how secure data is? How can relevant threats be identified that need protection? How do risk analyses proceed?

    Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition

    Posted By: IrGens
    Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition

    Defensive Security Handbook: Best Practices for Securing Infrastructure, 2nd Edition by Lee Brotherston, Amanda Berlin, William F. Reyor
    English | July 30, 2024 | ISBN: 1098127242 | True PDF | 285 pages | 8.8 MB

    Information Security Management Professional (ISMP) based on ISO 27001 Courseware - 4th revised

    Posted By: yoyoloit
    Information Security Management Professional (ISMP) based on ISO 27001 Courseware - 4th revised

    Information Security Management Professional (ISMP) Based on ISO 27001 Courseware - 4th Revised
    by Haven, Dolf van der;Zeegers, Ruben;

    English | 2024 | ISBN: 9401810737 | 165 pages | True PDF | 9.7 MB