Subcategories
https://ico.bubbletone.io/?ref=cc9cf71212773f18bb2e727a
BUBBLETONE
The first decentralized telecom ecosystem that allows mobile network operators, phone users and service providers to interact directly.
ICO PRICE!
Make calls and use data during travel worldwide at great local rates
with direct connection to local operators
Next generation messenger with amazing communication features
No need to change your SIM-card or phone number

VISA and MasterCard accepted!

Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (Repost)

Posted By: DZ123
Hard and Soft Computing for Artificial Intelligence, Multimedia and Security (Repost)

Shin-ya Kobayashi, Andrzej Piegat, Jerzy Pejaś, "Hard and Soft Computing for Artificial Intelligence, Multimedia and Security"
English | 2016 | ISBN: 3319484281 | PDF | pages: 385 | 26.4 mb

Information and Communications Security

Posted By: step778
Information and Communications Security

Lucas C. K. Hui, S. H. Qing, Elaine Shi, "Information and Communications Security"
2015 | pages: 331 | ISBN: 3319219650 | PDF | 10,2 mb

Visual Mathematics and Cyberlearning

Posted By: AvaxGenius
Visual Mathematics and Cyberlearning

Visual Mathematics and Cyberlearning By Dragana Martinovic, Viktor Freiman, Zekeriya Karadag
English | EPUB | 2013 | 250 Pages | ISBN : 9400723202 | 2.36 MB

This first book in the series will describe the Net Generation as visual learners who thrive when surrounded with new technologies and whose needs can be met with the technological innovations. These new learners seek novel ways of studying, such as collaborating with peers, multitasking, as well as use of multimedia, the Internet, and other Information and Communication Technologies.

Certified Penetration Testing Consultant (CPTC)

Posted By: naag
Certified Penetration Testing Consultant (CPTC)

Certified Penetration Testing Consultant (CPTC)
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 6.5 Hours | 6.83 GB
Genre: eLearning | Language: English

Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging

Posted By: AvaxGenius
Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging

Big Digital Forensic Data: Volume 1: Data Reduction Framework and Selective Imaging By Darren Quick
English | PDF,EPUB | 2018 | 109 Pages | ISBN : 9811077622 | 5.27 MB

This book provides an in-depth understanding of big data challenges to digital forensic investigations, also known as big digital forensic data. It also develops the basis of using data mining in big forensic data analysis, including data reduction, knowledge management, intelligence, and data mining principles to achieve faster analysis in digital forensic investigations. By collecting and assembling a corpus of test data from a range of devices in the real world, it outlines a process of big data reduction, and evidence and intelligence extraction methods. Further, it includes the experimental results on vast volumes of real digital forensic data. The book is a valuable resource for digital forensic practitioners, researchers in big data, cyber threat hunting and intelligence, data mining and other related areas.

Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges (Repost)

Posted By: DZ123
Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges (Repost)

Serge Gutwirth, Ronald Leenes, Paul De Hert, "Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges"
English | 2013 | ISBN: 9400775393 | PDF | pages: 370 | 3.3 mb

Emerging Security Challenges: American Jihad, Terrorism, Civil War, and Human Rights

Posted By: readerXXI
Emerging Security Challenges: American Jihad, Terrorism, Civil War, and Human Rights

Emerging Security Challenges:
American Jihad, Terrorism, Civil War, and Human Rights

by Seung-Whan Choi
English | 2018 | ISBN: 1440863040 | 320 Pages | PDF | 2.72 MB

Maintaining Arctic Cooperation with Russia : Planning for Regional Change in the Far North

Posted By: readerXXI
Maintaining Arctic Cooperation with Russia : Planning for Regional Change in the Far North

Maintaining Arctic Cooperation with Russia :
Planning for Regional Change in the Far North

by Stephanie Pezard and Abbie Tingstad
English | 2017 | ISBN: 0833097458 | 101 Pages | PDF | 10 MB

Data Privacy Games

Posted By: AvaxGenius
Data Privacy Games

Data Privacy Games By Lei Xu
English | PDF,EPUB | 2018 | 187 Pages | ISBN : 3319779648 | 6.77 MB

With the growing popularity of “big data”, the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue.

CySA+ Cert Prep: 2 Vulnerability Management

Posted By: naag
CySA+ Cert Prep: 2 Vulnerability Management

CySA+ Cert Prep: 2 Vulnerability Management
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 194 MB
Genre: eLearning | Language: English

Vulnerabilities of the U.S. To an Electromagnetic Pulse Attack

Posted By: readerXXI
Vulnerabilities of the U.S. To an Electromagnetic Pulse Attack

Vulnerabilities of the U.S. To an Electromagnetic Pulse Attack :
Threat Assessments and Mitigation Recommendations

by Maryanne Schneider
English | 2016 | ISBN: 1634844777 | 233 Pages | PDF | 3.82 MB

Eurasia’s Maritime Rise and Global Security: From the Indian Ocean to Pacific Asia and the Arctic

Posted By: AvaxGenius
Eurasia’s Maritime Rise and Global Security: From the Indian Ocean to Pacific Asia and the Arctic

Eurasia’s Maritime Rise and Global Security: From the Indian Ocean to Pacific Asia and the Arctic By Geoffrey F. Gresh
English | PDF,EPUB | 2018 | 303 Pages | ISBN : 3319718053 | 14.63 MB

This book explores Eurasia’s growing embrace of its maritime geography from the Indian Ocean to Pacific Asia and the Arctic. In an age of climate change, the melting of the Arctic will transform Eurasia’s importance, in addition to influencing the political, economic, and military dynamics across Eurasia’s main maritime regions. These emerging shifts have already begun to alter maritime trade and investment patterns, and thus the global political economy. It also creates a rising threat to the current status quo of world order that has long been dominated by the Atlantic World. This edited volume showcases some of the world’s leading experts and examines Eurasia from a saltwater perspective, analyzing its main maritime spaces in a threefold manner—as avenue, as arena, as source—to show the significance of this geostrategic change and why it matters for the future of the world’s oceans.

Jessey Bullock, Jeff T. Parker - Wireshark e Metasploit. Dall'analisi di rete alle tecniche di attacco e di difesa

Posted By: Karabas91
Jessey Bullock, Jeff T. Parker - Wireshark e Metasploit. Dall'analisi di rete alle tecniche di attacco e di difesa

Jessey Bullock, Jeff T. Parker - Wireshark e Metasploit. Dall'analisi di rete alle tecniche di attacco e di difesa
Italian | 2018 | 242 pages | ISBN: 8850334427 | EPUB | 31,8 MB

Wireshark è uno standard de facto per analizzare e risolvere problemi di rete ma le sue potenzialità sono ben altre e abbracciano vari ambiti della sicurezza informatica, soprattutto se utilizzato insieme a Kali Linux e al framework Metasploit. Questo manuale mostra applicazioni offensive e difensive che spaziano dall'individuazione di accessi non autorizzati all'analisi di malware e al penetration testing. Diversi esempi spiegano il come e il perché dei principi di sicurezza informatica, mentre il lettore è invitato a mettere alla prova quanto appreso in un laboratorio virtuale in grado di simulare il traffico di rete. Nelle parti finali viene presentano il linguaggio Lua per personalizzare le funzionalità di Wireshark, e TShark per lavorare da riga di comando. Una lettura dedicata ai professionisti dell'Information Security e a chiunque voglia scoprire i punti deboli di una rete per metterla in sicurezza. Scarica il laboratorio di analisi scaricabile.

Crash Course Data Security

Posted By: AlenMiler
Crash Course Data Security

Crash Course Data Security by IntroBooks
English | 20 Apr. 2018 | ASIN: B07CKMPY62 | 26 Pages | MOBI | 159.73 KB

Developing Security Tools of WSN and WBAN Networks Applications

Posted By: AvaxGenius
Developing Security Tools of WSN and WBAN Networks Applications

Developing Security Tools of WSN and WBAN Networks Applications By Mohsen A. M. El-Bendary
English | EPUB | 2015 | 212 Pages | ISBN : 4431550682 | 6.63 MB

This book focuses on two of the most rapidly developing areas in wireless technology (WT) applications, namely, wireless sensors networks (WSNs) and wireless body area networks (WBANs). These networks can be considered smart applications of the recent WT revolutions. The book presents various security tools and scenarios for the proposed enhanced-security of WSNs, which are supplemented with numerous computer simulations. In the computer simulation section, WSN modeling is addressed using MATLAB programming language.