Subcategories
JOIN NOW!
https://www.facebook.com/AvaxHomeLearning/ facebook.com/AvaxHomeLearning

Memory Performance of Prolog Architectures (The Springer International Series in Engineering and Computer Science)

Posted By: lengen
Memory Performance of Prolog Architectures (The Springer International Series in Engineering and Computer Science)

Memory Performance of Prolog Architectures (The Springer International Series in Engineering and Computer Science) by Evan Tick
English | Nov. 1, 2011 | ISBN: 1461292026 | 241 Pages | PDF | 9 MB

One suspects that the people who use computers for their livelihood are growing more "sophisticated" as the field of computer science evolves. This view might be defended by the expanding use of languages such as C and Lisp in contrast to the languages such as FORTRAN and COBOL. This hypothesis is false however - computer languages are not like natural languages where successive generations stick with the language of their ancestors.

Cybersecurity and Cyberwar: What Everyone Needs to Know [Audiobook]

Posted By: First1
Cybersecurity and Cyberwar: What Everyone Needs to Know [Audiobook]

Cybersecurity and Cyberwar: What Everyone Needs to Know [Audiobook] by P. W. Singer, Allan Friedman
English | January 26th, 2016 | ASIN: B01AGPGP6Q, ISBN: 0199918090 | MP3@64 kbps | 11 hrs 29 mins | 319.39 MB
Narrator: Sean Pratt

In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life.

TOR: 2 in 1 Beginners Guidebook: Beginners to Expert Guide to Accessing the Dark Net and Hacking the Ultimate Beginner's Guide

Posted By: First1
TOR: 2 in 1 Beginners Guidebook: Beginners to Expert Guide to Accessing the Dark Net and Hacking the Ultimate Beginner's Guide

TOR: 2 in 1 Beginners Guidebook: Beginners to Expert Guide to Accessing the Dark Net and Hacking the Ultimate Beginner's Guide by Bruce Rogers
English | August 2nd, 2017 | ISBN: 1974216780 | 360 pages | AZW3 | 0.34 MB

Best-selling author, Bruce Rogers, presents a remarkable beginners’ guide made simple and easy to understand to help all aspiring hackers learn and master the fundamentals of hacking and IT security.

Computer and Network Security Essentials

Posted By: AvaxGenius
Computer and Network Security Essentials

Computer and Network Security Essentials By Kevin Daimi
English | PDF | 2017 (2018 Edition) | 609 Pages | ISBN : 3319584235 | 12.65 MB

This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics.

Hacking: Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks

Posted By: naag
Hacking: Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks

Hacking: Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks
English | 2017 | ASIN: B074PXH1Z2 | 64 pages | AZW3 | 0.2 Mb

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Posted By: Willson
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Roger A. Grimes, "Hacking the Hacker: Learn From the Experts Who Take Down Hackers"
English | 2017 | ISBN: 1119396212 | 320 pages | EPUB | 0.9 MB

Android Hacker's Handbook (Repost)

Posted By: roxul
Android Hacker's Handbook (Repost)

Joshua J. Drake, Zach Lanier, Collin Mulliner, "Android Hacker's Handbook"
2014 | ISBN-10: 111860864X | 576 pages | EPUB, MOBI | 44 MB

Computer Networks Security from Scratch to Advanced (2017)

Posted By: ParRus
Computer Networks Security from Scratch to Advanced (2017)

Computer Networks Security from Scratch to Advanced (2017)
WEBRip | English | MP4 + Project Files | 1280 x 720 | AVC ~53 kbps | 30 fps
AAC | 192 Kbps | 48.0 KHz | 2 channels | ~8 hours | 892 MB
Genre: eLearning Video / Development, Programming

Computer Networks Security Technologies and Tools for Network Admins and Security Officers

Ethical Hacking for Beginners

Posted By: naag
Ethical Hacking for Beginners

Ethical Hacking for Beginners
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2 Hours | 627 MB
Genre: eLearning | Language: English

This video course provides a good starting point from which to learn ethical hacking and identify threats and vulnerabilities to secure your IT environment.

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

Posted By: ksveta6
The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
2014 | ISBN: 1118825098 | English | 912 pages | EPUB | 10 MB

Udemy - Learn Website Hacking / Penetration Testing From Scratch

Posted By: First1
Udemy - Learn Website Hacking / Penetration Testing From Scratch

Udemy - Learn Website Hacking / Penetration Testing From Scratch
Size: 1.87 GB | Duration: 9 hrs 5 mns | Video: AVC (.mp4) 1920x1080 29.97fps | Audio: AAC 48KHz 2ch
Genre: eLearning | Language: English | + Article, Supplemental Resources

Learn how to hack websites and web applications like black hat hackers, and learn how to secure them from these hackers!

CEH v9: Certified Ethical Hacker Version 9 Study Guide

Posted By: First1
CEH v9: Certified Ethical Hacker Version 9 Study Guide

CEH v9: Certified Ethical Hacker Version 9 Study Guide by Oriyano
English | April 29th, 2016 | ASIN: B01F0HZ1JW, ISBN: 1119252245 | 648 pages | EPUB | 7.76 MB

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material.

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

Posted By: First1
CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition by Matt Walker
English | September 16th, 2016 | ASIN: B01KL1FVXI, ISBN: 125983655X | 529 pages | EPUB | 10.56 MB

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

Hacking: 3 Books in 1- The Ultimate Beginner's Guide to Learn Hacking Effectively + Tips and Tricks to learn Hacking

Posted By: naag
Hacking: 3 Books in 1- The Ultimate Beginner's Guide to Learn Hacking Effectively + Tips and Tricks to learn Hacking

Hacking: 3 Books in 1- The Ultimate Beginner's Guide to Learn Hacking Effectively + Tips and Tricks to learn Hacking + Strategies(Basic Security, Wireless Hacking, Ethical Hacking, Programming)
English | 2017 | ASIN: B074HD6WRB | 170 pages | AZW3 | 0.2 Mb

Data Freedom: Hacking, Blockchain (Bitcoin, Digital Economy, Data Driven, Big Data, Security)

Posted By: naag
Data Freedom: Hacking, Blockchain (Bitcoin, Digital Economy, Data Driven, Big Data, Security)

Data Freedom: Hacking, Blockchain (Bitcoin, Digital Economy, Data Driven, Big Data, Security)
English | 2017 | ASIN: B0747KQDLV | 123 pages | AZW3 | 0.5 Mb