Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4
https://canv.ai/
The picture is generated by canv.ai

We are excited to announce that Canv.ai now features a built-in translator, allowing you to communicate in your native language. You can write prompts in your language, and they will be automatically translated into English, facilitating communication and the exchange of ideas!

We value freedom of speech and guarantee the absence of censorship on Canv.ai. At the same time, we hope and believe in the high moral standards of our users, which will help maintain a respectful and constructive atmosphere.


👉 Check for yourself!

Yonas Gebremichael - Master Termux - Hacking with Android: Beginner to Advance Complete Guide

Posted By: Bibliotkaaa
Yonas Gebremichael - Master Termux - Hacking with Android: Beginner to Advance Complete Guide

Yonas Gebremichael - Master Termux - Hacking with Android: Beginner to Advance Complete Guide
August 25, 2023 | ASIN: B0CGNXTSVG | English | 548 pages | PDF, EPUB | 25.35 MB

Romain Hennion, Anissa Makhlouf, "Cybersécurité: Un ouvrage unique pour les managers"

Posted By: TimMa
Romain Hennion, Anissa Makhlouf, "Cybersécurité: Un ouvrage unique pour les managers"

Romain Hennion, Anissa Makhlouf, "Cybersécurité: Un ouvrage unique pour les managers"
2018 | ISBN: 2212568932 | Français | EPUB | 465 pages | 12.9 MB

Alors que les cyberattaques se multiplient, les auteurs proposent des conseils pour aider les entreprises, d'un point de vue organisationnel et managérial, à protéger les données informatiques sensibles, stockées aussi bien dans leurs propres systèmes que dans le cloud ou sur Internet. Les auteurs proposent un guide pratique pour la mise en place du règlement général sur la protection des données. …

Marco Aurélio Thompson, "Comment être un hacker éthique en 7 étapes simples"

Posted By: TimMa
Marco Aurélio Thompson, "Comment être un hacker éthique en 7 étapes simples"

Marco Aurélio Thompson, "Comment être un hacker éthique en 7 étapes simples"
2022 | ASIN: B0BR5SJYDF | Français | EPUB | 44 pages | 0.2 MB

C'est avec grand plaisir que nous vous présentons notre nouveau livre, "Comment devenir un hacker éthique en 7 étapes simples". Dans ce livre, nous abordons un sujet de plus en plus pertinent dans le monde actuel : la formation de l'hacker éthique. …

B. Anass, "Wi-Fi hacking avec Kali Linux"

Posted By: TimMa
B. Anass, "Wi-Fi hacking avec Kali Linux"

B. Anass, "Wi-Fi hacking avec Kali Linux"
2019 | ISBN: 1798017946 | Français | EPUB | 120 pages | 5.2 MB

Vous avez toujours voulu apprendre à hacker un Wi-Fi protégé par un mot de passe ?
Vous êtes-vous déjà demandé s'il était facile de vous faufiler dans l'ordinateur de quelqu'un ?
Vous voulez un guide complet sur les différentes techniques qu’utilisent les hackers pour pénétrer les réseaux WI-FI ? Et comment le faire avec Kali Linux ?

Miles Price, "Hacking avec Python"

Posted By: TimMa
Miles Price, "Hacking avec Python"

Miles Price, "Hacking avec Python"
2017 | ISBN: 1979970467 | Français | EPUB | 70 pages | 0.1 MB

Ethical hacking is the art of testing your own network and computers for security holes and learning how to close them up before an unethical hacker gets the chance to get in and do damage. With all the stories in the news on an almost daily basis about hacking, digital security has become one of the most crucial factors in our lives.
Most people do their banking online, they use PayPal, they use email and these, plus any other service or website you use with personal information, are open to being hacked. …

Hacking Exposed: Know the secrets of Network Security

Posted By: yoyoloit
Hacking Exposed: Know the secrets of Network Security

Hacking Exposed
by Soumya Ranjan Behera

English | 2019 | ISBN: ‎ 938728431X | 206 pages | PDF | 47.42 MB

CEH Certified Ethical Hacker Cert Guide, 4th Edition

Posted By: sammoh
CEH Certified Ethical Hacker Cert Guide, 4th Edition

CEH Certified Ethical Hacker Cert Guide, 4th Edition
English | 2021 | ISBN: 9780136905776 | 752 pages | EPUB | 11 MB

This book is a complete guide to prepare for the CEH Certified Ethical Hacker certification exam.
Leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 11 exam and advance your career in IT security. The authors concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.

DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Posted By: l3ivo
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance

Dhruba Kumar Bhattacharyya, Jugal Kumar Kalita, "DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance"
English | 2016 | ISBN: 1498729649 | 312 pages | PDF | 10 MB

All Data Are Local: Thinking Critically in a Data-Driven Society

Posted By: l3ivo
All Data Are Local: Thinking Critically in a Data-Driven Society

Yanni Alexander Loukissas, "All Data Are Local: Thinking Critically in a Data-Driven Society"
English | 2019 | ISBN: 0262039664 | 272 pages | EPUB | 6.1 MB

How to Hack Like a Ghost: Breaching the Cloud

Posted By: lucky_aut
How to Hack Like a Ghost: Breaching the Cloud

How to Hack Like a Ghost: Breaching the Cloud by Flow
English | 1 April 2021 | ISBN : 1718501269 | 200 pages | True AZW3 | 1 MB

How to Hack Like a Ghost takes you deep inside the mind of a hacker as you carry out a fictionalized attack against a tech company, teaching cutting-edge hacking techniques along the way.

A Prehistory of the Cloud

Posted By: l3ivo
A Prehistory of the Cloud

Tung-Hui Hu, "A Prehistory of the Cloud"
English | 2016 | ISBN: 0262529963 | 240 pages | AZW3 | 2.5 MB

Practical Social Engineering: A Primer for the Ethical Hacker [Early Access]

Posted By: l3ivo
Practical Social Engineering: A Primer for the Ethical Hacker [Early Access]

Joe Gray, "Practical Social Engineering: A Primer for the Ethical Hacker [Early Access]"
English | 2021 | ISBN: 171850098X | 210 pages | PDF | 6.7 MB

Practical Electronics: Components and Techniques: Components and Techniques

Posted By: l3ivo
Practical Electronics: Components and Techniques: Components and Techniques

J. M. Hughes, "Practical Electronics: Components and Techniques: Components and Techniques"
English | 2015 | ISBN: 1449373070 | 560 pages | HQ PDF | 358 MB

Brute Force: Cracking the Data Encryption Standard

Posted By: AvaxGenius
Brute Force: Cracking the Data Encryption Standard

Brute Force: Cracking the Data Encryption Standard by Matt Curtin
English | PDF | 2005 | 283 Pages | ISBN : 0387201092 | 2 MB

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces of paper. With these changes in technology and the ways it was used came a need to protect both the systems and the information. For the next ten years, encryption systems of varying strengths were developed, but none proved to be rigorous enough. In 1973, the NBS put out an open call for a new, stronger encryption system that would become the new federal standard. Several years later, IBM responded with a system called Lucifer that came to simply be known as DES (data encryption standard).

Hacking Mastery With Kali Linux

Posted By: l3ivo
Hacking Mastery With Kali Linux

Vidya Basant, "Hacking Mastery With Kali Linux"
English | 2021 | ASIN: B0943CJR5Q | 207 pages | EPUB | 13.9 MB