Subcategories
http://app.wirexapp.com/join/yzI_PsT5s0qxs8JlGcfEpw Secure solutions for your digital money

Bitcoin Wallet | Payment Card | Money transfer | Buy Bitcoin
Available in multiple traditional currencies
(dollars, euro, and GBP)
supported countries are temporarily limited to
European region + Israel and Turkey
SIGN UP FOR FREE
25% discount on your first plastic card.


Cryptography and Security in Computing

Posted By: hill0
Cryptography and Security in Computing

Cryptography and Security in Computing by Jaydip Sen
English | 2012 | ISBN: 9789535101796 | 256 Pages | PDF | 4.55 MB

Ethical and Social Issues in the Information Age, Sixth Edition

Posted By: AvaxGenius
Ethical and Social Issues in the Information Age, Sixth Edition

Ethical and Social Issues in the Information Age, Sixth Edition By Joseph Migga Kizza
English | PDF,EPUB | 2017 | 422 Pages | ISBN : 3319707116 | 7.1 MB

This engaging and thought-provoking textbook examines the ethical, social, and policy challenges arising from our rapidly and continuously evolving computing technology, ranging from the Internet to the ubiquitous portable devices we use to access it. The text emphasizes the need for a strong ethical framework for all applications of computer science and engineering in our professional and personal life.

CompTIA Advanced Security Practitioner (CASP) CAS-003

Posted By: naag
CompTIA Advanced Security Practitioner (CASP) CAS-003

CompTIA Advanced Security Practitioner (CASP) CAS-003
MP4 | Video: AVC 1280x720 | Audio: AAC 48KHz 2ch | Duration: 11 Hours 40M | 15.6 GB
Genre: eLearning | Language: English

Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks

Posted By: First1
Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks

Computer Networking Problems and Solutions: An innovative approach to building resilient, modern networks by Russ White, Ethan Banks
English | January 8th, 2018 | ISBN: 1587145049, 9781587145049 | 833 Pages | True PDF | 9.43 MB

Master Modern Networking by Understanding and Solving Real Problems Computer Networking Problems and Solutions offers a new approach to understanding networking that not only illuminates current systems but prepares readers for whatever comes next. Its problem-solving approach reveals why modern computer networks and protocols are designed as they are, by explaining the problems any protocol or system must overcome, considering common solutions, and showing how those solutions have been implemented in new and mature protocols.

Private Security in Africa: From the Global Assemblage to the Everyday (Africa Now)

Posted By: AlexGolova
Private Security in Africa: From the Global Assemblage to the Everyday (Africa Now)

Private Security in Africa: From the Global Assemblage to the Everyday (Africa Now) by Doctor Paul Higate
English | 15 Jun. 2017 | ASIN: B0722X5LL2 | 256 Pages | AZW3 | 664.98 KB

Information Systems Security

Posted By: AvaxGenius
Information Systems Security

Information Systems Security: 13th International Conference, ICISS 2017, Mumbai, India, December 16-20, 2017, Proceedings By Rudrapatna K. Shyamasundar
English | PDF | 2017 | 419 Pages | ISBN : 3319725971 | 28.05 MB

This book constitutes the refereed proceedings of the 13th International Conference on Information Systems Security, ICISS 2017, held in Mumbai, India, in December 2017.

Cyber Security for Small Business

Posted By: naag
Cyber Security for Small Business

Cyber Security for Small Business
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 27 | 96 MB
Genre: eLearning | Language: English

Upgrade your Cyber Security knowledge to protect your business from Cyber crime such as Ransomware

The Bug Book

Posted By: Jeembo
The Bug Book

The Bug Book: Everything You Ever Wanted to Know About Electronic Eavesdropping … But Were Afraid to Ask by M.L. Shannon
English | 2000 | ISBN: 1581600658 | 168 Pages | PDF | 69.7 MB

What would you do if you thought you were being bugged? How would you defend yourself? How would you even know about it? If you've pondered these questions, and especially if you haven't, you need to read this book.

Information Security Practice and Experience

Posted By: AvaxGenius
Information Security Practice and Experience

Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings by Joseph K. Liu
English | PDF | 2017 | 904 Pages | ISBN : 3319723588 | 47.13 MB

This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Posted By: AvaxGenius
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations By Morey J. Haber
English | PDF,EPUB | 2017 (2018 Edition) | 261 Pages | ISBN : 1484230477 | 5 MB

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

Timing Channels in Cryptography [Repost]

Posted By: tanas.olesya
Timing Channels in Cryptography [Repost]

Timing Channels in Cryptography: A Micro-Architectural Perspective by Chester Rebeiro
English | 31 Dec. 2014 | ISBN: 3319123696 | 162 Pages | PDF | 6 MB

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors.

Privacy: A Very Short Introduction (Repost)

Posted By: step778
Privacy: A Very Short Introduction (Repost)

Raymond Wacks, "Privacy: A Very Short Introduction"
2010 | pages: 177 | ISBN: 0199556539 | PDF | 2,4 mb

WordPress Security: Secure Your Site Against Hackers

Posted By: naag
WordPress Security: Secure Your Site Against Hackers

WordPress Security: Secure Your Site Against Hackers
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | Lec: 35 | 814 MB
Genre: eLearning | Language: English

The Complete WordPress Security Course. From The Most Fundamental To The Most Advanced Up-To-Date Security Hacks

The Value of Operations Security

Posted By: naag
The Value of Operations Security

The Value of Operations Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 50M | 320 MB
Genre: eLearning | Language: English

Achieving and Sustaining Secured Business Operations

Posted By: Underaglassmoon
Achieving and Sustaining Secured Business Operations

Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
Apress | English | 2018 | ISBN-10: 1484230981 | 168 pages | PDF | 5.39 mb

by Neelesh Ajmani (Author), Dinesh Kumar (Author)