Subcategories
Tags
Language
Tags

La Camorra: The Notorious History and Legacy of the Neapolitan Mafia

Posted By: Free butterfly
La Camorra: The Notorious History and Legacy of the Neapolitan Mafia

La Camorra: The Notorious History and Legacy of the Neapolitan Mafia by Charles River Editors
English | September 19, 2019 | ISBN: 1694306046 | 79 pages | EPUB | 0.78 Mb

Public-Key Cryptography – PKC 2021

Posted By: AvaxGenius
Public-Key Cryptography – PKC 2021

Public-Key Cryptography – PKC 2021: 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10–13, 2021, Proceedings, Part II by Juan A. Garay
English | PDF | 2021 | 777 Pages | ISBN : 303075247X | 22.2 MB

The two-volume proceedings set LNCS 12710 and 12711 constitutes the proceedings of the 24th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2021, which was held online during May 10-13, 2021. The conference was originally planned to take place in Edinburgh, UK, but had to change to an online format due to the COVID-19 pandemic.

Advanced Informatics for Computing Research

Posted By: AvaxGenius
Advanced Informatics for Computing Research

Advanced Informatics for Computing Research: 4th International Conference, ICAICR 2020, Gurugram, India, December 26–27, 2020, Revised Selected Papers, Part I by Ashish Kumar Luhach
English | PDF | 2021 | 698 Pages | ISBN : 9811636591 | 108.9 MB

This two-volume set (CCIS 1393 and CCIS 1394) constitutes selected and revised papers of the 4th International Conference on Advanced Informatics for Computing Research, ICAICR 2020, held in Gurugram, India, in December 2020.

Mediated Terrorism in the 21st Century

Posted By: AvaxGenius
Mediated Terrorism in the 21st Century

Mediated Terrorism in the 21st Century by Elena Caoduro
English | PDF | 2021 | 301 Pages | ISBN : 3030735109 | 5 MB

Mediated Terrorism in the 21st Century offers new interpretations of figures emerging from representations of terrorism and counterterrorism: the male hero, female agent, religious leader, victim/perpetrator, and survivor.

QUINTESSENTIAL GUIDE TO CYBERSECURITY For Starters : Step By Step Guide To Get Started Kindle Edition

Posted By: ELK1nG
QUINTESSENTIAL GUIDE TO CYBERSECURITY For Starters : Step By Step Guide To Get Started Kindle Edition

QUINTESSENTIAL GUIDE TO CYBERSECURITY For Starters : Step By Step Guide To Get Started Kindle Edition
English | 2021 | ISBN: B097JRJZTV | 21 pages | PDF,EPUB,AZW3 | 982 KB

This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cybersecurity and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to the security domain changes and how artificial intelligence and machine learning are helping to secure systems.

ICT Systems Security and Privacy Protection

Posted By: hill0
ICT Systems Security and Privacy Protection

ICT Systems Security and Privacy Protection
English | 2021 | ISBN: 3030781194 | 464 Pages | PDF EPUB | 59 MB

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Posted By: First1
Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks

Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks by Aditya K. Sood
English | April 14th, 2021 | ISBN: 1683926854 | 469 pages | True PDF | 6.71 MB

This book is designed for security and risk assessment professionals, DevOpsengineers, penetration testers, cloud security engineers, and cloud softwaredevelopers who are interested in learning practical approaches to cloud security. It covers practical strategies for assessing the security and privacy of your cloud infrastructure and applications and shows how to make your cloud infrastructure secure to combat threats, attacks, and prevent data breaches.

Silicon Valley Cybersecurity Conference

Posted By: AvaxGenius
Silicon Valley Cybersecurity Conference

Silicon Valley Cybersecurity Conference: First Conference, SVCC 2020, San Jose, CA, USA, December 17–19, 2020, Revised Selected Papers by Younghee Park
English | PDF | 2021 | 232 Pages | ISBN : 3030727246 | 22.7 MB

This book constitutes selected and revised papers from the First Silicon Valley Cybersecurity Conference, held in San Jose, USA, in December 2020. Due to the COVID-19 pandemic the conference was held in a virtual format.

Cisco ISE 2.4 Basic Training

Posted By: ELK1nG
Cisco ISE 2.4 Basic Training

Cisco ISE 2.4 Basic Training
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 30 lectures (8h 12m) | Size: 4.32 GB

Learn Cisco Identity Services Engine (ISE) with Step by Step Lab Workbook

Broad Scope Bug Bounties From Scratch

Posted By: ELK1nG
Broad Scope Bug Bounties From Scratch

Broad Scope Bug Bounties From Scratch
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 48.0 KHz
Language: English | Size: 1.64 GB | Duration: 2h 12m

Finally learn what to do after recon

Introduction to Network Routing

Posted By: lucky_aut
Introduction to Network Routing

Introduction to Network Routing
Duration: 1h 15m | .MP4 1280x720, 30 fps(r) | AAC, 48000 Hz, 2ch | 175 MB
Genre: eLearning | Language: English

Cryptocurrency Security: Trade and Invest Bitcoin Safely

Posted By: IrGens
Cryptocurrency Security: Trade and Invest Bitcoin Safely

Cryptocurrency Security: Trade and Invest Bitcoin Safely
.MKV, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 1h 5m | 987 MB
Instructor: Zlatin Georgiev

CCIE Routing & Switching Version 5.0 - Security

Posted By: ELK1nG
CCIE Routing & Switching Version 5.0 - Security

CCIE Routing & Switching Version 5.0 - Security
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44100 Hz
Language: English | Size: 6.02 GB | Duration: 7h 54m

The best way to prepare for CCIE Routing and Switching Version 5 certification.

Fundamentals of Cryptography: Introducing Mathematical and Algorithmic Foundations

Posted By: hill0
Fundamentals of Cryptography: Introducing Mathematical and Algorithmic Foundations

Fundamentals of Cryptography: Introducing Mathematical and Algorithmic Foundations
(Undergraduate Topics in Computer Science)

English | 2021 | ISBN: 3030734919 | 294 Pages | PDF EPUB | 32 MB

Security Management | Complete Security Management Training

Posted By: ELK1nG
Security Management | Complete Security Management Training

Security Management | Complete Security Management Training
MP4 | Video: h264, 1280x720 | Audio: AAC, 48000 Hz
Language: English | Size: 1.05 GB | Duration: 1h 45m

Gain professional skills in Organizational & Cyber Security Management and understand Security Risk Analysis & Reduction