Subcategories
https://initiativeq.com/invite/rI_mqXPIQ
Initiative Q is reserving Q currency for people who join today

The earlier you join the more Q you can reserve!
Think of it as getting free bitcoin seven years ago.

Certified Ethical Hacker Training Course for 2018

Posted By: naag
Certified Ethical Hacker Training Course for 2018

Certified Ethical Hacker Training Course for 2018
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 7.5 Hours | Lec: 113 | 937 MB
Genre: eLearning | Language: English

New Solutions for Cybersecurity (MIT Connection Science and Engineering)

Posted By: Underaglassmoon
New Solutions for Cybersecurity (MIT Connection Science and Engineering)

New Solutions for Cybersecurity (MIT Connection Science and Engineering)
MIT | English | 2017 | ISBN-10: 0262535378 | 504 pages | PDF | 21.63 MB

by Howard Shrobe (Editor), David L. Shrier (Editor), Alex Pentland (Editor)
Experts from MIT explore recent advances in cybersecurity, bringing together management, technical, and sociological perspectives

Hack Audio: An Introduction to Computer Programming and Digital Signal Processing in MATLAB

Posted By: Underaglassmoon
Hack Audio: An Introduction to Computer Programming and Digital Signal Processing in MATLAB

Hack Audio: An Introduction to Computer Programming and Digital Signal Processing in MATLAB
Routledge | English | 2018 | ISBN-10: 113849755X | 492 pages | EPUB | 20.1 MB

by Eric Tarr (Author)
Computers are at the center of almost everything related to audio. Whether for synthesis in music production, recording in the studio, or mixing in live sound, the computer plays an essential part.

Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Posted By: Underaglassmoon
Fuzzing for Software Security Testing and Quality Assurance, Second Edition

Fuzzing for Software Security Testing and Quality Assurance, Second Edition
Artech House | English | 2018 | ISBN-10: 1608078507 | 330 pages | PDF | 24.12 MB

by Ari Takanen;Jared D. Demott;Charles Miller (Author)
This newly revised and expanded second edition of the popular Artech House title, Fuzzing for Software Security Testing and Quality Assurance, provides practical and professional guidance on how and why to integrate fuzzing into the software development lifecycle.

Hands-On Web Penetration Testing with Kali Linux

Posted By: naag
Hands-On Web Penetration Testing with Kali Linux

Hands-On Web Penetration Testing with Kali Linux
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 367 MB
Genre: eLearning | Language: English

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Posted By: First1
Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking by Ric Messier
English | July 17th, 2018 | ISBN: 149202869X | 402 Pages | EPUB (True/HQ) | 18.54 MB

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

The Complete Nmap course: Beginner To Intermediate

Posted By: igor_lv
The Complete Nmap course: Beginner To Intermediate

The Complete Nmap course: Beginner To Intermediate
MP4 | Video: 1280x720 | Duration: 2 Hours | 0.6 GB | Subtitles: VTT
Author: Ofer Shmueli | Language: English | Skill level: All Levels

Master Nmap reconnaissance for ethical hacking and penetration testing

Android Hacking for Kali Linux - Expert in 21 days

Posted By: naag
Android Hacking for Kali Linux - Expert in 21 days

Android Hacking for Kali Linux - Expert in 21 days
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | Lec: 25 | 128 MB
Genre: eLearning | Language: English

Understanding Cybersecurity

Posted By: Underaglassmoon
Understanding Cybersecurity

Understanding Cybersecurity: Emerging Governance and Strategy
Rowman & Littlefield | English | 2018 | ISBN-10: 1786606798 | 286 pages | PDF | 17.38 MB

by Jr., Gary, Schaub (Editor)
Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war.

Hacking For Dummies (For Dummies (Computer/Tech)), 6th Edition

Posted By: First1
Hacking For Dummies (For Dummies (Computer/Tech)), 6th Edition

Hacking For Dummies (For Dummies (Computer/Tech)), 6th Edition by Kevin Beaver
English | July 11th, 2018 | ISBN: 1119485479 | 416 Pages | EPUB (True/HQ) | 9.72 MB

Stop hackers before they hack you!

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (repost)

Posted By: libr
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications (repost)

Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications by Thomas J. Holt and Bernadette H. Schell
English | ISBN: 1616928050 | 2010 | 350 pages | PDF | 4,2 MB

Digital Resilience : Is Your Company Ready for the Next Cyber Threat?

Posted By: readerXXI
Digital Resilience : Is Your Company Ready for the Next Cyber Threat?

Digital Resilience : Is Your Company Ready for the Next Cyber Threat?
by Ray A. Rothrock and Richard A. Clarke
English | 2018 | ISBN: 0814439241 | 269 Pages | PDF | 1.92 MB

Hacking For Beginners

Posted By: naag
Hacking For Beginners

Hacking For Beginners
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | Lec: 13 | 360 MB
Genre: eLearning | Language: English

Ethical hacking of WiFi: WPA and WPA2 encryption

Posted By: igor_lv
Ethical hacking of WiFi: WPA and WPA2 encryption

Ethical hacking of WiFi: WPA and WPA2 encryption
MP4 | Video: 1280x720 | Duration: 3.5 Hours | 1.6 GB | Subtitles: VTT
Author: Fahad Ashfaq | Language: English | Skill level: All Levels

In this course, you will learn how to do ethically hacking of wifi WPA and WPA2 encryption.

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

Posted By: First1
Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments

Pentesting Azure Applications: The Definitive Guide to Testing and Securing Deployments by Matt Burrough
English | July 31st, 2018 | ISBN: 1593278632 | 218 Pages | EPUB (True/HQ) | 20.86 MB

A comprehensive guide to penetration testing cloud services deployed in Microsoft Azure, the popular cloud computing service provider used by numerous companies large and small.