Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Involuntary Repossession: In the Steal of the Night

Posted By: First1
Involuntary Repossession: In the Steal of the Night

Involuntary Repossession: In the Steal of the Night by John L. Russell
English | October 15th, 1980 | ISBN: 0873643097 | 64 Pages | PDF | 3.35 MB

Revealed here are some of the classic methods that thieves have used to steal cars. Originally written for auto repossessors, police and lock-smiths, this unique guide enables the reader to open and start many locked, keyless cars in just minutes This edition covers all American cars up to 1979.

Confidential Informants: A Closer Look at Police Policy

Posted By: Jeembo
Confidential Informants: A Closer Look at Police Policy

Confidential Informants: A Closer Look at Police Policy by Jon Shane
English | 2016 | ISBN: 3319222511 | 112 Pages | PDF | 2.8 MB

While confidential informants (CI’s) can play a crucial role in police investigations, they also have the potential to cause great harm if they are dishonest.

Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017

Posted By: naag
Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017

Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017. Tips and Signs to Protect your hardaware and software
English | 2017 | ISBN-10: 1546841164 | 38 pages | AZW3/PDF/EPUB (conv) | 0.6 Mb

Guide to Firewalls & VPN's, 3rd Edition

Posted By: First1
Guide to Firewalls & VPN's, 3rd Edition

Guide to Firewalls & VPN's, 3rd Edition by Michael E. Whitman
English | June 16th, 2011 | ISBN: 1111135398 | 36 Pages | True PDF | 2.62 MB

Firewalls are among the best-known network security tools in use today, and their critical role in information security continues to grow. However, firewalls are most effective when backed by thoughtful security planning, well-designed security policies, and integrated support from anti-virus software, intrusion detection systems, and related tools.

Advanced Client Security

Posted By: naag
Advanced Client Security

Advanced Client Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 208 MB
Genre: eLearning | Language: English

Special Operations from a Small State Perspective: Future Security Challenges

Posted By: AvaxGenius
Special Operations from a Small State Perspective: Future Security Challenges

Special Operations from a Small State Perspective: Future Security Challenges By Gunilla Eriksson, Ulrica Pettersson
English | PDF | 2017 | 203 Pages | ISBN : 331943960X | 7.6 MB

“Over the past dozen years special operations forces (SOF) have been one of the few areas of growth and expansion in a number of militaries. This growth and expansion, however, has not been mirrored by a comparable one in academic inquiries into the subject.

Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites

Posted By: naag
Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites

Penetration Testing and Reverse Engineering: Intrusion Detection Systems and e-Commerce Websites
English | 2016 | ISBN-10: 1541176669 | 612 pages | PDF + EPUB | 1.72 Mb

Web Security/Penetration Testing for Beginners

Posted By: naag
Web Security/Penetration Testing for Beginners

Web Security/Penetration Testing for Beginners
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 7 Hours | 1.01 GB
Genre: eLearning | Language: English

This course will take your skill set to next level as a Penetration Tester with Web security Knowledge

Penetration Testing: Setting the Scope and Rules of Engagement

Posted By: naag
Penetration Testing: Setting the Scope and Rules of Engagement

Penetration Testing: Setting the Scope and Rules of Engagement
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 206 MB
Genre: eLearning | Language: English

Penetration testing is in high demand. This course will teach you what a penetration test consists of, as well as how to deliver a professional penetration testing engagement for paying customers.

ISE Posture Services for CCNP Security (300-208) SISAS

Posted By: naag
ISE Posture Services for CCNP Security (300-208) SISAS

ISE Posture Services for CCNP Security (300-208) SISAS
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 50M | 324 MB
Genre: eLearning | Language: English

This course dives into the world of Network Admission Control (NAC) using Cisco ISE for posture assessment. The topics covered in this course prepare you for the 300-208 SISAS exam.

Mastering pfSense

Posted By: readerXXI
Mastering pfSense

Mastering pfSense
by David Zientara
English | 2016 | ISBN: 1786463431 | 406 Pages | True PDF | 5.8 MB

Timing Channels in Cryptography: A Micro-Architectural Perspective (Repost)

Posted By: step778
Timing Channels in Cryptography: A Micro-Architectural Perspective (Repost)

Chester Rebeiro, Debdeep Mukhopadhyay, Sarani Bhattacharya, "Timing Channels in Cryptography: A Micro-Architectural Perspective"
2014 | pages: 162 | ISBN: 3319123696 | PDF | 6,1 mb

Digital Forensics and Cyber Crime

Posted By: step778
Digital Forensics and Cyber Crime

Pavel Gladyshev, Andrew Marrington, Ibrahim Baggili, "Digital Forensics and Cyber Crime"
2014 | pages: 259 | ISBN: 3319142887 | PDF | 24,1 mb

How to Develop and Implement a Security Master Plan (Repost)

Posted By: step778
How to Develop and Implement a Security Master Plan (Repost)

Timothy Giles, "How to Develop and Implement a Security Master Plan"
2008 | pages: 376 | ISBN: 1420086251 | PDF | 3,0 mb

Information Processing and Security Systems (Repost)

Posted By: step778
Information Processing and Security Systems (Repost)

Khalid Saeed, Jerzy Pejas, "Information Processing and Security Systems"
2005 | pages: 476 | ISBN: 0387250913 | PDF | 22,4 mb