Subcategories

Counterintelligence Theory and Practice (Security and Professional Intelligence Education Series), Second Edition

Posted By: sasha82
Counterintelligence Theory and Practice (Security and Professional Intelligence Education Series), Second Edition

Counterintelligence Theory and Practice (Security and Professional Intelligence Education Series), Second Edition by Hank Prunckun
2019 | ISBN: 1786606887, 1786606879 | English | 272 pages | PDF + EPUB | 3 + 38 MB

IT Security Foundations: Core Concepts [Released 10/11/2019]

Posted By: IrGens
IT Security Foundations: Core Concepts [Released 10/11/2019]

IT Security Foundations: Core Concepts [Released 10/11/2019]
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 35m | 265 MB
Instructor: Lisa Bock

«Överbefälhavarens hemlighet» by Björn Ranelid

Posted By: Gelsomino
«Överbefälhavarens hemlighet» by Björn Ranelid

«Överbefälhavarens hemlighet» by Björn Ranelid
Svenska | ISBN: 9789100156428 | EPUB | 0.3 MB

Enterprise Level Security: Securing Information Systems in an Uncertain World (Repost)

Posted By: step778
Enterprise Level Security: Securing Information Systems in an Uncertain World (Repost)

William R. Simpson, "Enterprise Level Security: Securing Information Systems in an Uncertain World"
2016 | pages: 413 | ISBN: 1498764452 | PDF | 19,1 mb

Physical Layer Security in Wireless Communications (Repost)

Posted By: step778
Physical Layer Security in Wireless Communications (Repost)

Xiangyun Zhou, Lingyang Song, Yan Zhang, "Physical Layer Security in Wireless Communications"
2013 | pages: 308 | ISBN: 1466567007 | PDF | 9,0 mb

El enemigo conoce el sistema: Manipulación de ideas, personas e influencias después de la economía de la atención

Posted By: ksveta6
El enemigo conoce el sistema: Manipulación de ideas, personas e influencias después de la economía de la atención

El enemigo conoce el sistema: Manipulación de ideas, personas e influencias después de la economía de la atención (Sociedad) by Marta Peirano
2019 | ISBN: 8417636390 | Español | 304 pages | EPUB | 0.4 MB

Strategic Security: Forward Thinking for Successful Executives

Posted By: ksveta6
Strategic Security: Forward Thinking for Successful Executives

Strategic Security: Forward Thinking for Successful Executives by Jean Perois
2019 | ISBN: 0815357877 | English | 221 pages | PDF | 8 MB

Emerging Security Algorithms and Techniques

Posted By: ksveta6
Emerging Security Algorithms and Techniques

Emerging Security Algorithms and Techniques by Khaleel Ahmad, M. N. Doja, Nur Izura Udzir, Manu Pratap Singh
2019 | ISBN: 0815361459 | English | 330 pages | PDF | 12 MB

Preparing to Manage Security and Privacy Risk with NIST's Risk Management Framework

Posted By: IrGens
Preparing to Manage Security and Privacy Risk with NIST's Risk Management Framework

Preparing to Manage Security and Privacy Risk with NIST's Risk Management Framework
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 3h 11m | 335 MB
Instructor: Bobby Rogers

Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course (2019)

Posted By: ParRus
Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course (2019)

Udemy - Hacking in Practice Certified Ethical Hacking MEGA Course (2019)
WEBRip | English | MP4 | 1280 x 720 | AVC ~185 Kbps | 25 fps
AAC | 192 Kbps | 48.0 KHz | 2 channels | Subs: English | ~27 hours | 4.61 GB
Genre: Video Tutorial

Practical Ethical Hacking Techniques. The most extensive ethical hacking on-line course.

«Kuriren» by Henrik Blanckert

Posted By: Gelsomino
«Kuriren» by Henrik Blanckert

«Kuriren» by Henrik Blanckert
Svenska | ISBN: 9789176292655 | EPUB | 0.5 MB

Violated Online: How Online Slander Can Destroy Your Life & What You Must Do to Protect Yourself (Repost)

Posted By: step778
Violated Online: How Online Slander Can Destroy Your Life & What You Must Do to Protect Yourself (Repost)

Steven Wyer, Jeremy Dunlap, "Violated Online: How Online Slander Can Destroy Your Life & What You Must Do to Protect Yourself"
2011 | pages: 240 | ISBN: 0983745609 | EPUB | 1,7 mb

The Information Security Dictionary

Posted By: step778
The Information Security Dictionary

Urs E. Gattiker, "The Information Security Dictionary: Defining the Terms That Define Security for E-Business, Internet, Information and Wireless Technology"
2004 | pages: 444 | ISBN: 1402079273 | PDF | 4,6 mb

Hands-on Linux Host Security for SysAdmins

Posted By: IrGens
Hands-on Linux Host Security for SysAdmins

Hands-on Linux Host Security for SysAdmins
.MP4, AVC, 1920x1080, 30 fps | English, AAC, 2 Ch | 1h 20m | 325 MB
Instructor: Paul Olushile