Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Netzwerksicherheits-Analyse mit Open Source Tools: Wireshark, EtherApe, Metasploit und Nmap

Posted By: IrGens
Netzwerksicherheits-Analyse mit Open Source Tools: Wireshark, EtherApe, Metasploit und Nmap

Netzwerksicherheits-Analyse mit Open Source Tools: Wireshark, EtherApe, Metasploit und Nmap
.MP4, AVC, 1280x720, 30 fps | Deutsch, AAC, 2 Ch | 2 Std. 35 Min. | 573 MB
Trainer: Thomas Joos

Hackers vs. Websites: Motivations, Weaknesses & Techniques

Posted By: lucky_aut
Hackers vs. Websites: Motivations, Weaknesses & Techniques

Hackers vs. Websites: Motivations, Weaknesses & Techniques
Published 4/2024
Duration: 2h41m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.09 GB
Genre: eLearning | Language: English

Reasons behind website Attacks, Techniques used to hack websites

Guide to Wireless Network Security

Posted By: AvaxGenius
Guide to Wireless Network Security

Guide to Wireless Network Security by John R. Vacca
English | PDF (True) | 2006 | 835 Pages | ISBN : 0387954252 | 62.6 MB

1. INTRODUCTION With the increasing deployment of wireless networks (802. 11 architecture) in enterprise environments, IT enterprises are working to implement security mechanisms that are equivalent to those existing today for wire-based networks. An important aspect of this is the need to provide secure access to the network for valid users. Existing wired network jacks are located inside buildings already secured from unauthorized access through the use of keys, badge access, and so forth. A user must gain physical access to the building in order to plug a client computer into a network jack. In contrast, a wireless access point (AP) may be accessed from off the premises if the signal is detectable (for instance, from a parking lot adjacent to the building). Thus, wireless networks require secure access to the AP and the ability to isolate the AP from the internal private network prior to user authentication into the network domain. Furthermore, as enterprises strive to provide better availability of mission-critical wireless data, they also face the challenge of maintaining that data's security and integrity. While each connection with a client, a supplier or a enterprise partner can improve responsiveness and efficiency, it also increases the vulnerability of enterprise wireless data to attack. In such an environment, wireless network security is becoming more important every day. Also, with the growing reliance on e-commerce, wireless network-based services and the Internet, enterprises are faced with an ever-increasing responsibility to protect their systems from attack.

Proceedings of the International Conference on Internet of Things, Communication and Intelligent Technology (Repost)

Posted By: AvaxGenius
Proceedings of the International Conference on Internet of Things, Communication and Intelligent Technology (Repost)

Proceedings of the International Conference on Internet of Things, Communication and Intelligent Technology by Jian Dong, Long Zhang
English | PDF,EPUB | 2023 | 806 Pages | ISBN : 9819904153 | 175.7 MB

This book includes original, peer-reviewed research papers from the International Conference on Internet of Things, Communication and Intelligent Technology (IoTCIT) 2022. It contains the application of communication and IoT engineering in the age of intelligent technology+ from the standpoint of disciplinary integration, combining theory and associated IoT and intelligent technology algorithms. The topics cover the full range of IoT solutions, from IoT to network security, and focus on many forms of communication, such as Next Generation (6G) Mobile Communication, D2D, and M2M Communication. Additionally, it examines Intelligent Technology, with a focus on Information System Modeling and Simulation. It also explores Cloud Computing, Pervasive and Mobile Computing, Distributed Computing, High Performance Computing, and Ubiquitous Computing.

SECURING THE DIGITAL FRONTIER

Posted By: eBookRat
SECURING THE DIGITAL FRONTIER

SECURING THE DIGITAL FRONTIER
by VARUN SHAH, SHEETAL TEMARA, VISHAL DIYORA

English | March 26, 2024 | ASIN: B0CZ6X1M4D | 318 pages | PDF | 161 Mb

Cisco Umbrella Training

Posted By: lucky_aut
Cisco Umbrella Training

Cisco Umbrella Training
Last updated 11/2023
Duration: 9h15m | .MP4 1280x720, 30 fps(r) | AAC, 44100 Hz, 2ch | 3.55 GB
Genre: eLearning | Language: English

Protecting networks with Cisco Umbrella DNS Security, Secure Internet Gateway & Implementing SASE

Guardians of the Cloud A Guide to Computer Network Security

Posted By: eBookRat
Guardians of the Cloud A Guide to Computer Network Security

Guardians of the Cloud A Guide to Computer Network Security: Guardians of the Cloud A Guide to Computer Network Security
by Kit L

English | March 13, 2024 | ASIN: B0CY2KYJLK | 48 pages | PNG (.rar) | 8.74 Mb

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Part III

Posted By: readerXXI
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Part III

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part III
by Christina Pöpper, Lejla Batina
English | 2024 | ASIN: B0CTZPN985 | 476 Pages | True PDF | 27 MB

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Part II

Posted By: readerXXI
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Part II

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part II
by Christina Pöpper, Lejla Batina
English | 2024 | ISBN: 3031547721 | 523 Pages | True PDF | 20 MB

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Part I

Posted By: readerXXI
Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Part I

Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5–8, 2024, Proceedings, Part I
by Christina Pöpper, Lejla Batina
English | 2024 | ASIN: B0CTPZK173 | 509 Pages | True PDF | 19 MB

Shell scripting for Cybersecurity

Posted By: eBookRat
Shell scripting for Cybersecurity

Shell scripting for Cybersecurity: Mastering Bash to Enhance System Security, Vulnerability Management, and Threat Response
by Jeffery Owens

English | December 31, 2023 | ASIN: B0CR9F92QM | 92 pages | PNG (.rar) | 21 Mb

«Learn Penetration Testing with Python 3.x» by Yehia Elghaly

Posted By: Gelsomino
«Learn Penetration Testing with Python 3.x» by Yehia Elghaly

«Learn Penetration Testing with Python 3.x» by Yehia Elghaly
English | EPUB | 6.5 MB

Network Protocols for Security: TCP and UDP

Posted By: IrGens
Network Protocols for Security: TCP and UDP

Network Protocols for Security: TCP and UDP
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 20m | 80.9 MB
Instructor: Brandon DeVault

Network Protocols for Security: IPv4 and ARP

Posted By: IrGens
Network Protocols for Security: IPv4 and ARP

Network Protocols for Security: IPv4 and ARP
.MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 18m | 86.2 MB
Instructor: Brandon DeVault

Information Security and Cryptology

Posted By: AvaxGenius
Information Security and Cryptology

Information Security and Cryptology: 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9–10, 2023, Revised Selected Papers, Part II by Chunpeng Ge, Moti Yung
English | PDF (True) | 2024 | 426 Pages | ISBN : 981970944X | 24 MB

The two-volume set LNCS 14526 and 14527 constitutes the refereed proceedings of the 19th International Conference on Information Security and Cryptology, Inscrypt 2023, held in Hangzhou, China, during December 9–10, 2023. The 38 full papers and 7 short papers presented in these proceedings were carefully reviewed and selected from 152 submissions. The papers have been organized in the following topical sections: