Subcategories

Udemy - Ethereum Developer Masterclass: Build Real World Projects

Posted By: First1
Udemy - Ethereum Developer Masterclass: Build Real World Projects

Udemy - Ethereum Developer Masterclass: Build Real World Projects
Size: 1.50 GB | Duration: 9 hrs 31 mins | Video: AVC (.mp4) 1280x720 11fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | + Articles

Launch An Initial Coin Offering & Build A Decentralised Exchange On The Blockchain Using Solidity With This Masterclass!

Udemy - Ethereum Blockchain Developer: Build Projects Using Solidity

Posted By: First1
Udemy - Ethereum Blockchain Developer: Build Projects Using Solidity

Udemy - Ethereum Blockchain Developer: Build Projects Using Solidity
Size: 1.56 GB | Duration: 7 hrs 40 mins | Video: AVC (.mp4) 1280x720 30fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | + Articles

One Of The Largest, Most In-Depth Ethereum Blockchain Development Courses, Helping You To Build Projects Using Solidity!

Manual of Spine Surgery [Repost]

Posted By: ChrisRedfield
Manual of Spine Surgery [Repost]

Uwe Vieweg, Frank Grochulla - Manual of Spine Surgery
Published: 2012-10-23 | ISBN: 3642226817 | PDF | 405 pages | 33.25 MB

Identity and Data Security for Web Development: Best Practices

Posted By: First1
Identity and Data Security for Web Development: Best Practices

Identity and Data Security for Web Development: Best Practices by Jonathan LeBlanc, Tim Messerschmidt
English | June 20th, 2016 | ISBN: 1491937017, 9781491937013 | 203 pages | True PDF | 13.46 MB

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.

Network Forensics

Posted By: First1
Network Forensics

Network Forensics by Ric Messier
English | July 14th, 2017 | ASIN: B073Z57P9B, ISBN: 1119328284 | 302 pages | EPUB | 20.74 MB

Intensively hands-on training for real-world network forensics. Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity.

Cryptographic Hardware and Embedded Systems -- CHES 2014

Posted By: DZ123
Cryptographic Hardware and Embedded Systems -- CHES 2014

Lejla Batina, Matthew Robshaw, "Cryptographic Hardware and Embedded Systems – CHES 2014"
English | 2014 | ISBN: 3662447088 | PDF | pages: 631 | 26.0 mb

Advances in Cryptology -- CRYPTO 2014, Part II

Posted By: DZ123
Advances in Cryptology -- CRYPTO 2014, Part II

Juan A. Garay, Rosario Gennaro, "Advances in Cryptology – CRYPTO 2014, Part II"
English | 2014 | ISBN: 3662443805 | PDF | pages: 548 | 6.3 mb

Advances in Cryptology -- CRYPTO 2014, Part I

Posted By: DZ123
Advances in Cryptology -- CRYPTO 2014, Part I

Juan A. Garay, Rosario Gennaro, "Advances in Cryptology – CRYPTO 2014, Part I"
English | 2014 | ISBN: 3662443708 | PDF | pages: 589 | 8.1 mb

Fast Software Encryption

Posted By: DZ123
Fast Software Encryption

Shiho Moriai, "Fast Software Encryption"
English | 2014 | ISBN: 3662439328 | PDF | pages: 597 | 12.4 mb

Mastering Bitcoin: Programming the Open Blockchain, 2nd Edition

Posted By: First1
Mastering Bitcoin: Programming the Open Blockchain, 2nd Edition

Mastering Bitcoin: Programming the Open Blockchain, 2nd Edition by Andreas M. Antonopoulos
English | July 1st, 2017 | ISBN: 1491954388 | 405 pages | True PDF | 11.32 MB

Join the technological revolution that's taking the world of finance by storm. Mastering Bitcoin is your guide through the seemingly complex world of bitcoin, providing the knowledge you need to participate in the internet of money. Whether you're building the next killer app, investing in a startup, or simply curious about the technology, this revised and expanded second edition provides essential detail to get you started.

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions, 3rd Edition

Posted By: First1
Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions, 3rd Edition

Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions, 3rd Edition by Joshua Wright, Johnny Cache
English | March 16th, 2015 | ISBN: 0071827633 | 545 pages | True PDF | 65.69 MB

Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you’ll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures.

Environmental Science for a Changing World (2nd Edition)

Posted By: Rare-1
Environmental Science for a Changing World (2nd Edition)

Susan Karr, Jeneen Interlandi, Anne Houtman, "Environmental Science for a Changing World (2nd Edition)"
ISBN: 1464162204 | 2015 | PDF | 596 pages | 122.72 MB

Public Key Cryptography: Applications and Attacks (Repost)

Posted By: roxul
Public Key Cryptography: Applications and Attacks (Repost)

Lynn Margaret Batten, "Public Key Cryptography: Applications and Attacks"
English | 2013 | ISBN: 1118317122 | 209 pages | EPUB | 2 MB

Основы классической криптологии. Секреты шифров и кодов

Posted By: igor_lv
Основы классической криптологии. Секреты шифров и кодов

Основы классической криптологии. Секреты шифров и кодов - М.В.Адаменко
2016 | ISBN: 5970601667 | PDF | 2-ое издание | 298 pages | 48 Mb

В книге рассматриваются простые шифры и особенности их практического применения даже неподготовленными пользователями в повседневной жизни.

Cryptography: A Very Short Introduction [Repost]

Posted By: ChrisRedfield
Cryptography: A Very Short Introduction [Repost]

Fred Piper, Sean Murphy - Cryptography: A Very Short Introduction
Published: 2002-07-15 | ISBN: 0192803158 | PDF + CHM | 160 pages | 3.11 MB