Subcategories

A Brief History of Cryptology and Cryptographic Algorithms

Posted By: AvaxGenius
A Brief History of Cryptology and Cryptographic Algorithms

A Brief History of Cryptology and Cryptographic Algorithms by John F. Dooley
English | PDF,EPUB(Repost) | 2013 | 104 Pages | ISBN : 331901627X | 4.8 MB

The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over two thousand years governments, armies, and now individuals have wanted to protect their messages from the “enemy”.

Pentesting and Securing Web Applications (Ethical Hacking)

Posted By: Sigha
Pentesting and Securing Web Applications (Ethical Hacking)

Pentesting and Securing Web Applications (Ethical Hacking)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 4.57 GB
Genre: eLearning Video | Duration: 35 lectures (4 hour, 13 mins) | Language: English

Learn to pentest the most used medium in the world with timeless principals and some of the latest techniques!

Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!

Posted By: l3ivo
Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!

Occupytheweb, "Getting Started Becoming a Master Hacker: Hacking is the Most Important Skill Set of the 21st Century!"
English | 2019 | ISBN: 1711729299 | 358 pages | EPUB | 32.2 MB

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002), 2nd Edition

Posted By: First1
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002), 2nd Edition

CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide (Exam CS0-002), 2nd Edition by Brent Chapman, Fernando Maymi
English | November 30th, 2020 | ISBN: 126046430X | 608 pages | EPUB | 24.64 MB

Prepare for the CompTIA CySA+ certification exam with this fully updated self-study resource

The Domains of Identity : A Framework for Understanding Identity Systems in Contemporary Society

Posted By: readerXXI
The Domains of Identity : A Framework for Understanding Identity Systems in Contemporary Society

The Domains of Identity :
A Framework for Understanding Identity Systems in Contemporary Society

by Kaliya Young
English | 2020 | ISBN: 1785273698 | 142 Pages | PDF | 6.48 MB

How not to get Hacked

Posted By: lucky_aut
How not to get Hacked

How not to get Hacked
Duration: 31m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 174 MB
Genre: eLearning | Language: English

This 30min course will save you time and nerves. You will receive knowledge and tools to increase your security posture.

Hacking Web Applications via PDFs, Images, and Links

Posted By: lucky_aut
Hacking Web Applications via PDFs, Images, and Links

Hacking Web Applications via PDFs, Images, and Links
Duration: 51m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 220 MB
Genre: eLearning | Language: English

Learn How Your Web Applications Can Be Hacked via PDFs, Images, and Links

How Hacks Happen: and how to protect yourself

Posted By: hill0
How Hacks Happen: and how to protect yourself

How Hacks Happen: and how to protect yourself
by Mark Germanos

English | 2020 | ASIN: B08P868VWQ | 128 Pages | PDF, EPUB, AZW3 | 54 MB

Advanced Network Pentesting - Practical Tutorials

Posted By: Sigha
Advanced Network Pentesting - Practical Tutorials

Advanced Network Pentesting - Practical Tutorials
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 2.05 GB
Genre: eLearning Video | Duration: 16 lectures (3 hour, 54 mins) | Language: English

Road to become Network Penetration Tester

Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Repost)

Posted By: step778
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Repost)

Cameron Davidson-Pilon Davidson-Pilon, "Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference"
English | 2015 | pages: 256 | ISBN: 0133902838 | EPUB | 19,9 mb

Mac Unlocked: Everything You Need to Know to Get Cracking in macOS Big Sur

Posted By: First1
Mac Unlocked: Everything You Need to Know to Get Cracking in macOS Big Sur

Mac Unlocked: Everything You Need to Know to Get Cracking in macOS Big Sur by David Pogue
English | November 25th, 2020 | ISBN: 1982176679 | 448 pages | EPUB | 71.75 MB

Make the most of your Mac with this witty, authoritative guide to macOS Big Sur.

Top 10 sub-domain enumeration technique 2020

Posted By: lucky_aut
Top 10 sub-domain enumeration technique 2020

Top 10 sub-domain enumeration technique 2020
Duration: 3h 16m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 1.06 GB
Genre: eLearning | Language: English

We will cover all the latest subdomain enumeration tools and techniques to be used for pentesting, bug bounty, red team

Ethical Hacking - Hands-on Training Part II

Posted By: Sigha
Ethical Hacking - Hands-on Training Part II

Ethical Hacking - Hands-on Training Part II
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 1.45 GB
Genre: eLearning Video | Duration: 26 lectures (3 hour, 36 mins) | Language: English

Ethical Hacking - Hands-on Training Part II is an intermediate level hands-on course for ethical hacking

Machine Learning Approaches in Cyber Security Analytics

Posted By: AvaxGenius
Machine Learning Approaches in Cyber Security Analytics

Machine Learning Approaches in Cyber Security Analytics by Tony Thomas
English | EPUB | 2020 | 217 Pages | ISBN : 9811517053 | 30.5 MB

This book introduces various machine learning methods for cyber security analytics. With an overwhelming amount of data being generated and transferred over various networks, monitoring everything that is exchanged and identifying potential cyber threats and attacks poses a serious challenge for cyber experts. Further, as cyber attacks become more frequent and sophisticated, there is a requirement for machines to predict, detect, and identify them more rapidly. Machine learning offers various tools and techniques to automate and quickly predict, detect, and identify cyber attacks.

Cyber Security Threats and the Best Practices

Posted By: Sigha
Cyber Security Threats and the Best Practices

Cyber Security Threats and the Best Practices
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 255 MB
Genre: eLearning Video | Duration: 6 lectures (30 mins) | Language: English

DDOS, Social Engineering, Cloud Vulnerabilities, Ransomware,…etc and how to prevent them