Subcategories
Please register here if you want to download anything!

If domain in your address bar is different from the list below
PLEASE LEAVE THAT SITE IMMEDIATELY
❗IT'S A DANGEROUS FAKE❗



Spicy Magazines for Men! ;-)

Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Posted By: AvaxGenius
Machine Learning in Cyber Trust: Security, Privacy, and Reliability

Machine Learning in Cyber Trust: Security, Privacy, and Reliability by Philip S. Yu
English | PDF | 2009 | 367 Pages | ISBN : 0387887342 | 9.79 MB

Many networked computer systems are far too vulnerable to cyber attacks that can inhibit their functioning, corrupt important data, or expose private information. Not surprisingly, the field of cyber-based systems turns out to be a fertile ground where many tasks can be formulated as learning problems and approached in terms of machine learning algorithms.

Ethical Hacking: The Complete Malware Analysis Process

Posted By: IrGens
Ethical Hacking: The Complete Malware Analysis Process

Ethical Hacking: The Complete Malware Analysis Process
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 32m | 185 MB
Instructor: Malcolm Shore

Cybercryptography: Applicable Cryptography for Cyberspace Security (Repost)

Posted By: AvaxGenius
Cybercryptography: Applicable Cryptography for Cyberspace Security (Repost)

Cybercryptography: Applicable Cryptography for Cyberspace Security by Song Y. Yan
English | PDF,EPUB | 2019 | 443 Pages | ISBN : 3319725343 | 48.84 MB

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively.

Hands-On Ethical Hacking and Network Defense (2nd Edition)

Posted By: Jeembo
Hands-On Ethical Hacking and Network Defense (2nd Edition)

Hands-On Ethical Hacking and Network Defense (2nd Edition) by Michael T. Simpson, Kent Backman, James Corley
English | 2010 | ISBN: 1435486099 | 480 Pages | PDF | 28.4 MB

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks.

Ethical Hacking and Countermeasures: Attack Phases

Posted By: Jeembo
Ethical Hacking and Countermeasures: Attack Phases

Ethical Hacking and Countermeasures: Attack Phases by EC-Council
English | 2009 | ISBN: 143548360X | 352 Pages | PDF | 17.5 MB

The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures.

Ethical Hacking - Capture the Flag Walkthroughs - v2

Posted By: Sigha
Ethical Hacking - Capture the Flag Walkthroughs - v2

Ethical Hacking - Capture the Flag Walkthroughs - v2
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 44100 Hz, 2ch | 1.35 GB
Duration: 2 hours | Genre: eLearning | Language: English

Video and lab Walkthroughs for capture the Flag exercises that with strengthen your ethical hacking skills.

Network Science and Cybersecurity

Posted By: AvaxGenius
Network Science and Cybersecurity

Network Science and Cybersecurity by Robinson E. Pino
English | PDF,EPUB | 2014 | 282 Pages | ISBN : 1461475961 | 12.17 MB

Network Science and Cybersecurity introduces new research and development efforts for cybersecurity solutions and applications taking place within various U.S. Government Departments of Defense, industry and academic laboratories.

Real world Hacking & Penetration testing - Updated 2018

Posted By: naag
Real world Hacking & Penetration testing - Updated 2018

Real world Hacking & Penetration testing - Updated 2018
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 5.5 Hours | Lec: 57 | 1.18 GB
Genre: eLearning | Language: English

Penetration Testing of Identity, Authentication and Authorization Mechanism

Posted By: naag
Penetration Testing of Identity, Authentication and Authorization Mechanism

Penetration Testing of Identity, Authentication and Authorization Mechanism
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 97 MB
Genre: eLearning | Language: English

CEH v10 Certified Ethical Hacker Study Guide

Posted By: tarantoga
CEH v10 Certified Ethical Hacker Study Guide

Ric Messier, "CEH v10 Certified Ethical Hacker Study Guide"
ISBN: 1119533198 | 2019 | EPUB | 600 pages | 8 MB

Authentication Technologies for Cloud Computing, IoT and Big Data (Repost)

Posted By: AvaxGenius
Authentication Technologies for Cloud Computing, IoT and Big Data (Repost)

Authentication Technologies for Cloud Computing, IoT and Big Data by Yasser M. Alginahi
English | PDF | 2019 | 370 Pages | ISBN : 1785615564 | 26.68 MB

Critical systems and infrastructure rely heavily on ICT systems and networks where security issues are a major concern. Authentication methods verify that messages come from trusted sources and guarantee the smooth flow of information and data. In this edited reference, the authors present state-of-art research and development in authentication technologies including challenges and applications for Cloud Technologies, IoT and Big Data.

Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications (Repost)

Posted By: AvaxGenius
Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications (Repost)

Nature-Inspired Cyber Security and Resiliency: Fundamentals, Techniques and Applications by El-Sayed M. El-Alfy
English | PDF | 2019 | 480 Pages | ISBN : 1785616382 | 23.65 MB

With the rapid evolution of cyberspace, computing, communications and sensing technologies, organizations and individuals rely more and more on new applications such as fog and cloud computing, smart cities, Internet of Things (IoT), collaborative computing, and virtual and mixed reality environments. Maintaining their security, trustworthiness and resilience to cyber-attacks has become crucial which requires innovative and creative cyber security and resiliency solutions.

Understanding Cyber Risk : Protecting Your Corporate Assets

Posted By: readerXXI
Understanding Cyber Risk : Protecting Your Corporate Assets

Understanding Cyber Risk : Protecting Your Corporate Assets
by Thomas R. Koehler
English | 2018 | ISBN: 1472477790 | 152 Pages | PDF | 1.21 MB

Advances in Information and Computer Security

Posted By: AvaxGenius
Advances in Information and Computer Security

Advances in Information and Computer Security: 14th International Workshop on Security, IWSEC 2019, Tokyo, Japan, August 28–30, 2019, Proceedings by Nuttapong Attrapadung
English | PDF,EPUB | 2019 | 407 Pages | ISBN : 3030268330 | 47.17 MB

This book constitutes the refereed proceedings of the 14th International Workshop on Security, IWSEC 2019, held in Tokyo, Japan, in August 2019.

Coursera - Designing and Executing Information Security Strategies

Posted By: ParRus
Coursera - Designing and Executing Information Security Strategies

Coursera - Designing and Executing Information Security Strategies (University of Washington)
WEBRip | English | MP4 | 960 x 540 | AVC ~59.1 kbps | 29.970 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | 10:05:53 | 960 MB
Genre: eLearning Video / Information Technology, Computer Science, Security

This course provides you with opportunities to integrate and apply your information security knowledge. Following the case-study approach, you will be introduced to current, real-world cases developed and presented by the practitioner community. You will design and execute information assurance strategies to solve these cases.