Tags
Language
Tags
Buy Bitcoin With Credit Card Instantly!
Bitcoin Recovers! Be quick!

Buy Bitcoin With Credit Card Instantly!


CEX.IO is a secure, regulated, and licensed cryptocurrency exchange.
The exchange supports 100+ cryptocurrencies, including
Bitcoin, Ethereum, and other popular assets.

Normative Change and Security Community Disintegration: Undoing Peace (Repost)

Posted By: step778
Normative Change and Security Community Disintegration: Undoing Peace (Repost)

Simon Koschut, "Normative Change and Security Community Disintegration: Undoing Peace"
English | 2016 | pages: 289 | ISBN: 3319303236 | PDF | 2,6 mb

Socio-Technical Aspects in Security and Trust

Posted By: AvaxGenius
Socio-Technical Aspects in Security and Trust

Socio-Technical Aspects in Security and Trust: 9th International Workshop, STAST 2019, Luxembourg City, Luxembourg, September 26, 2019, Revised Selected Papers by Thomas Groß
English | PDF | 2021 | 238 Pages | ISBN : 3030559572 | 13 MB

The volume LNCS 11739 constitutes the proceedings of the 9th International Workshop on Socio-Technical Aspects in Security, STAST 2019, held in Luxembourg, in September 2019.
The total of 9 full papers together with 1 short paper was carefully reviewed and selected from 28 submissions. The papers were organized in topical sections named as follows: Methods for Socio-Technical Systems focused on instruments, frameworks and re ections on research methodology and also System Security considered security analyses and attacks on security systems. Finally, Privacy Control incorporated works on privacy protection and control as well as human factors in relation to these topics.

Human-computer interaction. Fundamentals

Posted By: AvaxGenius
Human-computer interaction. Fundamentals

Human-computer interaction. Fundamentals by Andrew Sears
English | PDF | 2009 | 352 Pages | ISBN : 1420088815 | 10.3 MB

Hailed on first publication as a compendium of foundational principles and cutting-edge research, The Human-Computer Interaction Handbook has become the gold standard reference in this field. Derived from select chapters of this groundbreaking and authoritative resource, Human-Computer Interaction Fundamentals emphasizes emerging topics such as sensor based interactions, tangible interfaces, augmented cognition, cognition under stress, ubiquitous and wearable computing, and privacy and security.

Digital Signatures (Advances in Information Security) (Repost)

Posted By: AvaxGenius
Digital Signatures (Advances in Information Security) (Repost)

Digital Signatures by Jonathan Katz
English | PDF | 2010 | 197 Pages | ISBN : 0387277110 | 1.6 MB

Digital Signatures is the first comprehensive account of the theoretical principles and techniques used in the design of provably secure signature schemes. In addition to providing the reader with a better understanding of the security guarantees provided by digital signatures, the book also contains full descriptions and detailed proofs for essentially all known secure signature schemes in the cryptographic literature.

Security Superstream: Ransomware

Posted By: sammoh
Security Superstream: Ransomware

Security Superstream: Ransomware
MP4 | Video: AVC 1920 x 1080 | Audio: AAC 48 Khz 1ch | Duration: 03:21:30 | 2.37 GB

In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal.

Security for Telecommunications Networks

Posted By: AvaxGenius
Security for Telecommunications Networks

Security for Telecommunications Networks by Patrick Traynor
English | PDF | 2008 | 185 Pages | ISBN : 0387724419 | 4.3 MB

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, well over three billion people across the globe rely upon these systems, as their primary means of connecting to the world around them.

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Posted By: yoyoloit
Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Agile Security Operations
by Hinne Hettema

English | 2022 | ISBN: ‎ 1801815518 | 254 pages | True PDF EPUB | 8.81 MB

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention

Posted By: yoyoloit
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention

Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention
by Nabie Y. Conteh;

English | 2021 | ISBN: ‎ 1799865045 , 978-1799865056 | 187 pages | True PDF EPUB | 22.02 MB

The Cybersecurity Playbook for Modern Enterprises (Early Access)

Posted By: GFX_MAN
The Cybersecurity Playbook for Modern Enterprises (Early Access)

The Cybersecurity Playbook for Modern Enterprises (Early Access)
English | 2022 | ISBN: 1803248637 | 449 pages | True EPUB | 2.53 MB

Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques

Peace Crimes: Pine Gap, national security and dissent

Posted By: roxul
Peace Crimes: Pine Gap, national security and dissent

Kieran Finnane, "Peace Crimes: Pine Gap, national security and dissent"
English | ISBN: 0702260444 | 2020 | 296 pages | PDF | 3 MB

Artificial Intelligence and Security (Repost)

Posted By: AvaxGenius
Artificial Intelligence and Security (Repost)

Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, July 19–23, 2021, Proceedings, Part I by Xingming Sun
English | EPUB | 2021 | 774 Pages | ISBN : 3030786080 | 101.2 MB

This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS.

Human-Computer Interaction. Interaction in Context (Repost)

Posted By: AvaxGenius
Human-Computer Interaction. Interaction in Context (Repost)

Human-Computer Interaction. Interaction in Context: 20th International Conference, HCI International 2018, Las Vegas, NV, USA, July 15–20, 2018, Proceedings, Part II by Masaaki Kurosu
English | PDF | 2018 | 671 Pages | ISBN : 3319912437 | 118 MB

The 3 volume-set LNCS 10901, 10902 + 10903 constitutes the refereed proceedings of the 20th International Conference on Human-Computer Interaction, HCI 2018, which took place in Las Vegas, Nevada, in July 2018.
The total of 1171 papers and 160 posters included in the 30 HCII 2018 proceedings volumes was carefully reviewed and selected from 4346 submissions.

Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Posted By: yoyoloit
Mastering Defensive Security: Effective techniques to secure your Windows, Linux, IoT, and cloud infrastructure

Mastering Defensive Security
by Cesar Bravo

English | 2022 | ISBN: ‎ 1800208162 | 528 pages | True PDF EPUB | 56.07 MB

Information Security Handbook (Internet of Everything (IoE))

Posted By: yoyoloit
Information Security Handbook (Internet of Everything (IoE))

Information Security Handbook; 1
by Jhanjhi Noor Zaman

English | 2022 | ISBN: ‎ 0367365723 | 271 pages | True PDF | 17.17 MB

Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and...

Posted By: sammoh
Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and...

Penetration Testing Azure for Ethical Hackers: Develop practical skills to perform pentesting and risk assessment
English | 2021 | ISBN: ‎9781839212934 | 352 pages | True ( PDF EPUB ) | 46.26 MB

Simulate real-world attacks using tactics, techniques, and procedures that adversaries use during cloud breaches