Subcategories
Tags
Language
Tags

Real-World Ethical Hacking: Hands-on Cybersecurity

Posted By: ELK1nG
Real-World Ethical Hacking: Hands-on Cybersecurity

Real-World Ethical Hacking: Hands-on Cybersecurity
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.51 GB | Duration: 10h 51m

Protect yourself, gain the hottest new job skills, and learn the tricks the bad guys use - with Kali Linux & Metasploit!

Hacking With Kali Linux: Useful Guide to Computer Network Hacking, Encryption, Cybersecurity, Penetration Testing for Beginners

Posted By: ELK1nG
Hacking With Kali Linux: Useful Guide to Computer Network Hacking, Encryption, Cybersecurity, Penetration Testing for Beginners

Hacking With Kali Linux: Useful Guide to Computer Network Hacking, Encryption, Cybersecurity, Penetration Testing for Beginners
English | 2021 | ISBN: B098VZC8RT | 138 pages | PDF,EPUB,AZW3 | 967 KB

Hacking With Kali Linux

Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity

Posted By: AvaxGenius
Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity

Advances in Human Factors in Robots, Unmanned Systems and Cybersecurity: Proceedings of the AHFE 2021 Virtual Conferences on Human Factors in Robots, Drones and Unmanned Systems, and Human Factors in Cybersecurity, July 25-29, 2021, USA by Matteo Zallio
English | PDF | 2021 | 283 Pages | ISBN : 3030799964 | 32.3 MB

This book focuses on the importance of human factors in the development of safe and reliable robotic and unmanned systems. It discusses solutions for improving the perceptual and cognitive abilities of robots, developing suitable synthetic vision systems, coping with degraded reliability in unmanned systems, and predicting robotic behavior in relation to human activities. It covers the design of improved, easy to use, human–system interfaces, together with strategies for increasing human–system performance, and reducing cognitive workload at the user interface.

Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques

Posted By: yoyoloit
Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques

Cisco Certified CyberOps Associate 200-201 Certification Guide: Learn blue teaming strategies and incident response techniques
by Glen D. Singh

English | 2021 | ISBN: 9781800560871, 1800560877 | 723 pages | EPUB | 42.13 MB

Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certification

Security and Privacy: Select Proceedings of ICSP 2020

Posted By: AvaxGenius
Security and Privacy: Select Proceedings of ICSP 2020

Security and Privacy: Select Proceedings of ICSP 2020 by Pantelimon Stănică
English | EPUB | 2020 | 183 Pages | ISBN : 9813367806 | 20.1 MB

This book consists of refereed selected papers from the International Conference on Security & Privacy – ICSP 2020. The book is focused on the state-of-the-art developments of network security, secure cryptographic protocols, post-quantum cryptography, quantum cryptography, block-chain and cryptocurrency, IoT security and privacy, cloud security, machine learning in cybersecurity, and other disciplines related to security and privacy.

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

Posted By: l3ivo
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners

Sam Grubb, "How Cybersecurity Really Works: A Hands-On Guide for Total Beginners"
English | 2021 | ISBN: 1718501285 | 216 pages | MOBI | 15 MB

Secure IT Systems

Posted By: AvaxGenius
Secure IT Systems

Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings by Mikael Asplund
English | EPUB | 2021 | 265 Pages | ISBN : 3030708519 | 18.1 MB

This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020.

How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Early Access)

Posted By: l3ivo
How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Early Access)

Sam Grubb, "How Cybersecurity Really Works: A Hands-On Guide for Total Beginners (Early Access)"
English | 2021 | ISBN: 1718501285 | 60 pages | True PDF | 5.2 MB

Secure IT Systems

Posted By: AvaxGenius
Secure IT Systems

Secure IT Systems: 25th Nordic Conference, NordSec 2020, Virtual Event, November 23–24, 2020, Proceedings by Mikael Asplund
English | PDF | 2021 | 265 Pages | ISBN : 3030708519 | 17.7 MB

This book constitutes the refereed proceedings of the 25th Nordic Conference on Secure IT Systems, NordSec 2020, which was organized by Linköping University, Sweden, and held online during November 23-24, 2020.

CyberBRICS: Cybersecurity Regulations in the BRICS Countries

Posted By: AvaxGenius
CyberBRICS: Cybersecurity Regulations in the BRICS Countries

CyberBRICS: Cybersecurity Regulations in the BRICS Countries by Luca Belli
English | EPUB | 2021 | 289 Pages | ISBN : 3030564045 | 0.6 MB

This book stems from the CyberBRICS project, which is the first initiative to develop a comparative analysis of the digital policies of the BRICS (Brazil, Russia, India, China and South Africa) countries. BRICS have been chosen as a focus not only because their digital policies are affecting more than 40% of the global population - i.e. roughly 3.2 billion individuals living in such countries - but also all the individuals and businesses willing to use technologies developed in the BRICS or trading digital goods and services with these countries.

Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction

Posted By: AvaxGenius
Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction

Identification of Pathogenic Social Media Accounts: From Data to Intelligence to Prediction by Hamidreza Alvari
English | EPUB | 2021 | 100 Pages | ISBN : 3030614301 | 7.6 MB

This book sheds light on the challenges facing social media in combating malicious accounts, and aims to introduce current practices to address the challenges. It further provides an in-depth investigation regarding characteristics of “Pathogenic Social Media (PSM),”by focusing on how they differ from other social bots (e.g., trolls, sybils and cyborgs) and normal users as well as how PSMs communicate to achieve their malicious goals.

Game Theory for Cyber Deception: From Theory to Applications

Posted By: AvaxGenius
Game Theory for Cyber Deception: From Theory to Applications

Game Theory for Cyber Deception: From Theory to Applications by Jeffrey Pawlick
English | PDF,EPUB | 2021 | 192 Pages | ISBN : 3030660648 | 25.2 MB

This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.

Constructing cybersecurity: Power, expertise and the internet security industry

Posted By: l3ivo
Constructing cybersecurity: Power, expertise and the internet security industry

Andrew Whiting, "Constructing cybersecurity: Power, expertise and the internet security industry"
English | 2020 | ISBN: 1526123320 | 279 pages | EPUB / MOBI / PDF | 3.62 MB

CyberBRICS: Cybersecurity Regulations in the BRICS Countries

Posted By: AvaxGenius
CyberBRICS: Cybersecurity Regulations in the BRICS Countries

CyberBRICS: Cybersecurity Regulations in the BRICS Countries by Luca Belli
English | PDF | 2021 | 289 Pages | ISBN : 3030564045 | 3.7 MB

This book stems from the CyberBRICS project, which is the first initiative to develop a comparative analysis of the digital policies of the BRICS (Brazil, Russia, India, China and South Africa) countries. BRICS have been chosen as a focus not only because their digital policies are affecting more than 40% of the global population - i.e. roughly 3.2 billion individuals living in such countries - but also all the individuals and businesses willing to use technologies developed in the BRICS or trading digital goods and services with these countries.

Research in Mathematics and Public Policy

Posted By: AvaxGenius
Research in Mathematics and Public Policy

Research in Mathematics and Public Policy by Mary Lee
English | PDF,EPUB | 2020 | 133 Pages | ISBN : 3030587479 | 15.1 MB

This volume features a variety of research projects at the intersection of mathematics and public policy. The topics included here fall in the areas of cybersecurity and climate change, two broad and impactful issues that benefit greatly from mathematical techniques. Each chapter in the book is a mathematical look into a specific research question related to one of these issues, an approach that offers the reader insight into the application of mathematics to important public policy questions.