Subcategories
http://app.wirexapp.com/join/yzI_PsT5s0qxs8JlGcfEpw Secure solutions for your digital money

Bitcoin Wallet | Payment Card | Money transfer | Buy Bitcoin
Available in multiple traditional currencies
(dollars, euro, and GBP)
supported countries are temporarily limited to
European region + Israel and Turkey
SIGN UP FOR FREE
25% discount on your first plastic card.


Dark Web - A Short Ride

Posted By: AlenMiler
Dark Web - A Short Ride

English | 27 Nov. 2017 | ASIN: B077SHKBD4 | 19 Pages | AZW3 | 187 KB

Forensic Analysis of Computer Memory

Posted By: IrGens
Forensic Analysis of Computer Memory

Forensic Analysis of Computer Memory
.MP4, AVC, 1000 kbps, 1280x720 | English, AAC, 128 kbps, 2 Ch | 1.1 hours | 658 MB
Instructor: Ric Messier

Information Security Practice and Experience

Posted By: AvaxGenius
Information Security Practice and Experience

Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017, Proceedings by Joseph K. Liu
English | PDF | 2017 | 904 Pages | ISBN : 3319723588 | 47.13 MB

This book constitutes the proceedings of the 13th International Conference on Information Security and Practice and Experience, ISPEC 2017, held in Melbourne, Australia, in December 2017.

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Posted By: AvaxGenius
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations By Morey J. Haber
English | PDF,EPUB | 2017 (2018 Edition) | 261 Pages | ISBN : 1484230477 | 5 MB

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

The Art of Computer Virus Research and Defense

Posted By: First1
The Art of Computer Virus Research and Defense

The Art of Computer Virus Research and Defense by Peter Szor
English | February 13th, 2005 | ISBN: 0321304543, 9780321304544 | 745 Pages | True PDF | 8.92 MB

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more.

Cryptography and Coding

Posted By: AvaxGenius
Cryptography and Coding

Cryptography and Coding: 16th IMA International Conference, IMACC 2017, Oxford, UK, December 12-14, 2017, Proceedings By Máire O'Neill
English | PDF | 2017 | 392 Pages | ISBN : 3319710443 | 7.16 MB

This book constitutes the proceedings of the 16th IMA International Conference on Cryptography and Coding, IMACC 2017, held at Oxford, UK, in December 2017. The 19 papers presented were carefully reviewed and selected from 32 submissions. The conference focuses on a diverse set of topics both in cryptography and coding theory.

Approaching Zero: Data Crime and the Computer Underworld by Bryan Clough (1993-05-19)

Posted By: lengen
Approaching Zero: Data Crime and the Computer Underworld by Bryan Clough (1993-05-19)

Approaching Zero: Data Crime and the Computer Underworld by Bryan Clough (1993-05-19) by Bryan Clough;Paul Mungo
English | 1752 | ASIN: B01K92BN54 | 121 Pages | PDF | 1 MB

Fry Guy watched the computer screen as the cursor blinked. Beside him a small electronic box chattered through a call routine, the numbers clicking audibly as each of the eleven digits of the phone number was dialed. Then the box made a shrill, electronic whistle, which meant that the call had gone through; Fry Guy's computer had been connected to another system hundreds of miles away.

The rise of the computer underworld to the point at which a single malicious program like Michelangelo can
cause law enforcement agencies, government ministries, and corporations to take special precautions, when
credit bureau information can be stolen and individuals' credit card accounts can be easily plundered, began
thirty years ago. Its impetus, curiously enough, was a simple decision by Bell Telephone to replace its human
operators with computers.

TOR: Beginners to Expert Guide

Posted By: igor_lv
TOR: Beginners to Expert Guide

TOR: Beginners to Expert Guide - Bruce Rogers
2017 | ASIN: B06WRS2VVK | AZW3 | 116 pages | 340 Kb

Администрирование сервера NGIXN

Posted By: igor_lv
Администрирование сервера NGIXN

Администрирование сервера NGIXN - Айвалиотис Д.
2015 | ISBN: 5970601624 | PDF | 288 pages | 9 Mb

Listening In: Cybersecurity in an Insecure Age

Posted By: First1
Listening In: Cybersecurity in an Insecure Age

Listening In: Cybersecurity in an Insecure Age by Susan Landau
English | November 28th, 2017 | ASIN: B076VJ62C9, ISBN: 0300227442 | 240 Pages | EPUB | 2.28 MB

A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers

The Antivirus Defense-in-Depth Guide

Posted By: lengen
The Antivirus Defense-in-Depth Guide

The Antivirus Defense-in-Depth Guide by Microsoft Solutions for Security
English | 2004 | ISBN: 0735621551 | 98 Pages | PDF | 1 MB

Although many organizations have deployed antivirus software, new viruses, worms, and other forms of malware (malicious software) continue to rapidly infect large numbers of computer systems.

Gray Hat Hacking: The Ethical Hacker's Handbook (Repost)

Posted By: igor_lv
Gray Hat Hacking: The Ethical Hacker's Handbook  (Repost)

Gray Hat Hacking: The Ethical Hacker's Handbook - Shon Harris
2007 | 2rd Edition | ISBN: 0071495681 | PDF | 577 pages | 12 Mb

Linux Hardening in Hostile Networks: Server Security from TLS to Tor

Posted By: First1
Linux Hardening in Hostile Networks: Server Security from TLS to Tor

Linux Hardening in Hostile Networks: Server Security from TLS to Tor by Kyle Rankin
English | August 5th, 2017 | ISBN: 0134173260 | 261 Pages | EPUB | 12.54 MB

Implement Industrial-Strength Security on Any Linux Server!

Ethical Hacking Full Series : From Scratch to Advanced ++

Posted By: naag
Ethical Hacking Full Series : From Scratch to Advanced ++

Ethical Hacking Full Series : From Scratch to Advanced ++
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 10 Hours | Lec: 100 | 1.29 GB
Genre: eLearning | Language: English

Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts!

The Complete Ethical Hacking Series - Honeypots, IDS and FW's

Posted By: naag
The Complete Ethical Hacking Series - Honeypots, IDS and FW's

The Complete Ethical Hacking Series - Honeypots, IDS and FW's
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 484 MB
Genre: eLearning | Language: English