Subcategories

Complete WiFi Hacking 2017

Posted By: naag
Complete WiFi Hacking 2017

Complete WiFi Hacking 2017
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | Lec: 29 | 363 MB
Genre: eLearning | Language: English

Learn Techniques and Methods for Gaining Access to WiFi Networks

Offensive Countermeasures: The Art of Active Defense

Posted By: AlenMiler
Offensive Countermeasures: The Art of Active Defense

Offensive Countermeasures: The Art of Active Defense by Ethan Robish
English | 23 Aug. 2017 | ISBN: 1491065966 | ASIN: B0753MCJV8 | 238 Pages | AZW3 | 1.45 MB

AWS Networking Cookbook

Posted By: AlenMiler
AWS Networking Cookbook

AWS Networking Cookbook by Satyajit Das
English | 24 Aug. 2017 | ISBN: 1787123243 | ASIN: B0742HR1Y4 | 366 Pages | AZW3 | 20.87 MB

Human-Computer Interaction – INTERACT 2017

Posted By: AvaxGenius
Human-Computer Interaction – INTERACT 2017

Human-Computer Interaction – INTERACT 2017: 16th IFIP TC 13 International Conference, Mumbai, India, September 25–29, 2017, Proceedings, Part III By Conference proceedings (INTERACT 2017)
English | PDF | 2017 | 565 Pages | ISBN : 3319676865 | 44.65 MB

The four-volume set LNCS 10513—10516 constitutes the proceedings of the 16th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2017, held in Mumbai, India, in September 2017.

Human-Computer Interaction – INTERACT 2017

Posted By: AvaxGenius
Human-Computer Interaction – INTERACT 2017

Human-Computer Interaction – INTERACT 2017: 16th IFIP TC 13 International Conference, Mumbai, India, September 25-29, 2017, Proceedings, Part IV By Conference proceedings(INTERACT 2017)
English | PDF | 2017 | 563 Pages | ISBN : 3319680587 | 56.7 MB

The four-volume set LNCS 10513—10516 constitutes the proceedings of the 16th IFIP TC 13 International Conference on Human-Computer Interaction, INTERACT 2017, held in Mumbai, India, in September 2017.

Mastering Kali Linux for Advanced Penetration Testing - Second Edition

Posted By: readerXXI
Mastering Kali Linux for Advanced Penetration Testing - Second Edition

Mastering Kali Linux for Advanced Penetration Testing - Second Edition
by Vijay Kumar Velu
English | 2017 | ISBN: 1787120236 | 501 Pages | True PDF | 32 MB

Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting

Posted By: step778
Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting

Peter H. Cole, Damith C. Ranasinghe, "Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting"
2007 | pages: 350 | ISBN: 3540716408 | PDF | 6,4 mb

Security Management in Mobile Cloud Computing

Posted By: readerXXI
Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing
by Kashif Munir
English | 2017 | ISBN: 1522506020 | 267 Pages | PDF | 11 MB

Online Banking Security Measures and Data Protection

Posted By: readerXXI
Online Banking Security Measures and Data Protection

Online Banking Security Measures and Data Protection
by Shadi A. Aljawarneh
English | 2017 | ISBN: 1522508643 | 340 Pages | PDF | 6.2 MB

Identity and Data Security for Web Development: Best Practices

Posted By: First1
Identity and Data Security for Web Development: Best Practices

Identity and Data Security for Web Development: Best Practices by Jonathan LeBlanc, Tim Messerschmidt
English | June 20th, 2016 | ISBN: 1491937017, 9781491937013 | 203 pages | True PDF | 13.46 MB

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you'll learn how and why everyone working on a system needs to ensure that users and data are protected.

Plugged In: Cybersecurity in the Modern Age

Posted By: tarantoga
Plugged In: Cybersecurity in the Modern Age

Jon Silman, "Plugged In: Cybersecurity in the Modern Age (Gatorbytes)"
ISBN: 1942852134 | 2017 | EPUB | 105 pages | 2 MB

Cisco Secure Firewall Services Module (Repost)

Posted By: step778
Cisco Secure Firewall Services Module (Repost)

Ray Blair, Arvind Durai, "Cisco Secure Firewall Services Module"
2008 | pages: 519 | ISBN: 1587053535 | PDF | 2,7 mb

The Turn to Infrastructure in Internet Governance (Repost)

Posted By: DZ123
The Turn to Infrastructure in Internet Governance (Repost)

Francesca Musiani, Derrick L. Cogburn, Laura DeNardis, "The Turn to Infrastructure in Internet Governance"
English | 2015 | ISBN: 1137533269 | PDF | pages: 273 | 2.1 mb

Программирование на Perl, 4-е издание

Posted By: igor_lv
Программирование на Perl, 4-е издание

Программирование на Perl, 4-е издание - Том Кристиансен
2014 | ISBN: 5932862149 | PDF/EPUB | 1048 pages | 14 Mb

В этом долгожданном обновлении три известных автора дополнили описание языка и добавили обзор некоторых особенностей готовящейся к выходу версии 5.16. Все большую значимость в обработке текстов приобретает Юникод, а Perl предлагает лучшую поддержку этого стандарта.

CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)

Posted By: AlenMiler
CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001)

CompTIA CSA+ Cybersecurity Analyst Certification All-in-One Exam Guide (CS0-001) by Fernando Maymi
English | 1 Sept. 2017 | ISBN: 126001181X | ASIN: B074BTJW57 | 421 Pages | AZW3 | 18.91 MB