Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Vest-Busters: How to Make Your Own Body-Armor-Piercing Bullets

Posted By: First1
Vest-Busters: How to Make Your Own Body-Armor-Piercing Bullets

Vest-Busters: How to Make Your Own Body-Armor-Piercing Bullets by Uncle Fester
English | December 6th, 1996 | ISBN: 0970148518 | 65 Pages | PDF | 4.41 MB

This celebration of the Second Amendment makes the point that if one's ammunition is made useless, what one has is then the de facto repeal of the Second Amendment. This repeal would have disatrous consequences, as shown by many historical examples given in the text wherein the disarmament of the civilian population was the prelude to mass homocidal or genocidal slaughters.

OAuth_2_in_Action

Posted By: First1
OAuth_2_in_Action

OAuth_2_in_Action by Justin Richer
English | March 18th, 2017 | ISBN: 161729327X | 362 Pages | True PDF | 10.99 MB

OAuth 2 in Action teaches you the practical use and deployment of this HTTP-based protocol from the perspectives of a client, authorization server, and resource server. You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.

Haters : Harassment, Abuse, and Violence Online

Posted By: readerXXI
Haters : Harassment, Abuse, and Violence Online

Haters : Harassment, Abuse, and Violence Online
by Bailey Poland
English | 2016 | ISBN: 1612347665 | 312 Pages | PDF | 1.22 MB

Procedures to Investigate Waterborne Illness (3rd Edition)

Posted By: Jeembo
Procedures to Investigate Waterborne Illness (3rd Edition)

Procedures to Investigate Waterborne Illness (3rd Edition)
English | 2016 | ISBN: 3319260251 | 153 Pages | PDF | 4.6 MB

Written by a team of international experts, this third edition designed to guide public health personnel or teams in any country that investigates reports of alleged waterborne illnesses.

Tricks of the Burglar Alarm Trade

Posted By: First1
Tricks of the Burglar Alarm Trade

Tricks of the Burglar Alarm Trade by Mike Kessler
English | January 15th, 1990 | ISBN: 0873645502 | 98 Pages | PDF | 10.67 MB

Is your property truly safe from intruders? Don't take any chances. This book explains the ins and outs of burglar alarms, helps you find and fix weaknesses in your system and shows you countermeasures to defeat burglars who try to bypass it.

The Ultimate Internet Terrorist: How Hackers, Geeks, And Phreaks Can Ruin Your Trip

Posted By: First1
The Ultimate Internet Terrorist: How Hackers, Geeks, And Phreaks Can Ruin Your Trip

The Ultimate Internet Terrorist: How Hackers, Geeks, And Phreaks Can Ruin Your Trip On The Information Superhighway And What You Can Do To Protect Yourself by Robert Merkle
English | March 1st, 1998 | ISBN: 0873649702 | 154 Pages | PDF | 12.60 MB

This is an owner's manual to the Darkside of the Web. Read it and weep. Then do what it takes to save yourself from becoming roadkill on the Highway to Hell.

Involuntary Repossession: In the Steal of the Night

Posted By: First1
Involuntary Repossession: In the Steal of the Night

Involuntary Repossession: In the Steal of the Night by John L. Russell
English | October 15th, 1980 | ISBN: 0873643097 | 64 Pages | PDF | 3.35 MB

Revealed here are some of the classic methods that thieves have used to steal cars. Originally written for auto repossessors, police and lock-smiths, this unique guide enables the reader to open and start many locked, keyless cars in just minutes This edition covers all American cars up to 1979.

Confidential Informants: A Closer Look at Police Policy

Posted By: Jeembo
Confidential Informants: A Closer Look at Police Policy

Confidential Informants: A Closer Look at Police Policy by Jon Shane
English | 2016 | ISBN: 3319222511 | 112 Pages | PDF | 2.8 MB

While confidential informants (CI’s) can play a crucial role in police investigations, they also have the potential to cause great harm if they are dishonest.

Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017

Posted By: naag
Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017

Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017. Tips and Signs to Protect your hardaware and software
English | 2017 | ISBN-10: 1546841164 | 38 pages | AZW3/PDF/EPUB (conv) | 0.6 Mb

Guide to Firewalls & VPN's, 3rd Edition

Posted By: First1
Guide to Firewalls & VPN's, 3rd Edition

Guide to Firewalls & VPN's, 3rd Edition by Michael E. Whitman
English | June 16th, 2011 | ISBN: 1111135398 | 36 Pages | True PDF | 2.62 MB

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools.

Advanced Client Security

Posted By: naag
Advanced Client Security

Advanced Client Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 208 MB
Genre: eLearning | Language: English

Special Operations from a Small State Perspective: Future Security Challenges

Posted By: AvaxGenius
Special Operations from a Small State Perspective: Future Security Challenges

Special Operations from a Small State Perspective: Future Security Challenges By Gunilla Eriksson, Ulrica Pettersson
English | PDF | 2017 | 203 Pages | ISBN : 331943960X | 7.6 MB

“Over the past dozen years special operations forces (SOF) have been one of the few areas of growth and expansion in a number of militaries. This growth and expansion, however, has not been mirrored by a comparable one in academic inquiries into the subject.

Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites

Posted By: naag
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites

Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites
English | 2016 | ISBN-10: 1541176669 | 612 pages | PDF + EPUB | 1.72 Mb

Web Security/Penetration Testing for Beginners

Posted By: naag
Web Security/Penetration Testing for Beginners

Web Security/Penetration Testing for Beginners
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 7 Hours | 1.01 GB
Genre: eLearning | Language: English

This course will take your skill set to next level as a Penetration Tester with Web security Knowledge

Penetration Testing: Setting the Scope and Rules of Engagement

Posted By: naag
Penetration Testing: Setting the Scope and Rules of Engagement

Penetration Testing: Setting the Scope and Rules of Engagement
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 206 MB
Genre: eLearning | Language: English

Penetration testing is in high demand. This course will teach you what a penetration test consists of, as well as how to deliver a professional penetration testing engagement for paying customers.