Subcategories
Tags
Language
Tags

Cybersecurity Attacks - Red Team Strategies [Repost]

Posted By: readerXXI
Cybersecurity Attacks - Red Team Strategies [Repost]

Cybersecurity Attacks - Red Team Strategies : A Practical Guide to Building a Penetration Testing Program Having Homefield Advantage
by Johann Rehberger
English | 2020 | ISBN: 1838828869 | 525 Pages | PDF/ePUB | 65 MB

Learn Computer Forensics [Repost]

Posted By: readerXXI
Learn Computer Forensics [Repost]

Learn Computer Forensics :
A Beginner's Guide to Searching, Analyzing, and Securing Digital Evidence

by William Oettinger
English | 2020 | ISBN: 1838648178 | 369 Pages | PDF/ePub/Mobi | 80 MB

Digital Forensics with Kali Linux, 2nd Edition [Repost]

Posted By: readerXXI
Digital Forensics with Kali Linux, 2nd Edition [Repost]

Digital Forensics with Kali Linux : Perform Data Acquisition, Data Recovery, Network Forensics, and Malware Analysis with Kali Linux, 2nd Edition
by Shiva V. N. Parasram
English | 2020 | ISBN: 1838640800 | 334 Pages | PDF/ePub | 54 MB

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

Posted By: l3ivo
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

Sam Grubb, "How Cybersecurity Really Works: A Hands-On Guide for Total Beginners"
English | 2021 | ISBN: 1718501285 | 216 pages | MOBI | 15 MB

Metasploit 5.0 for Beginners, 2nd Edition [Repost]

Posted By: readerXXI
Metasploit 5.0 for Beginners, 2nd Edition [Repost]

Metasploit 5.0 for Beginners : Perform Penetration Testing to Secure Your IT Environment Against Threats and Vulnerabilities, 2nd Edition
by Sagar Rahalkar
English | 2020 | ISBN: 1838982663 | 247 Pages | PDF/ePub/Mobi | 80 MB

Practical Mobile Forensics [Repost]

Posted By: readerXXI
Practical Mobile Forensics [Repost]

Practical Mobile Forensics : Forensically Investigate and Analyze IOS, Android, and Windows 10 Devices, 4th Edition
by Rohit Tamma, Oleg Skulkin
English | 2020 | ISBN: 183864752X | 384 Pages | PDF/ePub/Mobi | 87 MB

Digital Forensics and Incident Response, 2nd Edition [Repost]

Posted By: readerXXI
Digital Forensics and Incident Response, 2nd Edition [Repost]

Digital Forensics and Incident Response : Incident Response Techniques and Procedures to Respond to Modern Cyber Threats, 2nd Edition
by Gerard Johansen
English | 2020 | ISBN: 183864900X | 432 Pages | PDF/ePub/Mobi | 232 MB

The Ultimate Android Privacy Course - Get 100% rid of Google

Posted By: IrGens
The Ultimate Android Privacy Course - Get 100% rid of Google

The Ultimate Android Privacy Course - Get 100% rid of Google
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 2h 35m | 2.41 GB
Instructor: Wesley Feijth

Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Posted By: readerXXI
Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps

Privacy Concerns Surrounding Personal Information Sharing on Health
and Fitness Mobile Apps

by Devjani Sen and Rukhsana Ahmed
English | 2021 | ISBN: 1799834875 | 366 Pages | PDF/ePub | 7.93 MB

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM

Posted By: readerXXI
Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM

Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM
by Regner Sabillon
English | 2021 | ISBN: 1799841626 | 275 Pages | PDF/ePub | 7.72 MB

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

Posted By: AlexGolova
A Fierce Domain: Conflict in Cyberspace, 1986 to 2012

A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 by Cyber Conflict Studies Association; Illustrated edition
English | June 1, 2013 | ISBN: 098932740X | 356 pages | MOBI | 1.44 Mb

OAuth 2.0: Getting Started in Web-API Security (API University Series) (Volume 1)

Posted By: AlexGolova
OAuth 2.0: Getting Started in Web-API Security (API University Series) (Volume 1)

OAuth 2.0: Getting Started in Web-API Security (API University Series) (Volume 1) by CreateSpace Independent Publishing Platform; 1st edition
English | January 31, 2015 | ISBN: 1507800916 | 86 pages | AZW3 | 1.48 Mb

Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples

Posted By: AvaxKevin
Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples


Hacking with Kali Linux: A Guide to Ethical Hacking: A Beginner's Guide with Practical Examples by Grzegorz Nowak
English | 2019 | ASIN: B07ZG25ZLW | 84 Pages | PDF/EPUB/KINDLE | 2.94 MB

Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber Hacker

Posted By: AvaxKevin
Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber Hacker


Tor Browsing: Stay Anonymous and Safely Surf the Net like a Cyber Hacker by Brian Bladen
English | 2020 | ASIN: B08BKS9M6P | 32 Pages | PDF/AZW3/Kindle | 6.97 MB