Security+

Android Application Security Essentials (repost)  eBooks & eLearning

Posted by roxul at May 27, 2017
Android Application Security Essentials (repost)

Pragati Ogal Rai, "Android Application Security Essentials"
English | ISBN: 1849515603 | 2013 | 218 pages | PDF, EPUB | 11 MB

SpyHunter Malware Security Suite 4.26.12.4815 Multilingual + Portable  Software

Posted by speedzodiac_ at May 27, 2017
SpyHunter Malware Security Suite 4.26.12.4815 Multilingual + Portable

SpyHunter Malware Security Suite 4.26.12.4815 Multilingual + Portable | 27.2 Mb

SpyHunter is a powerful, highly effective malware remediation tool designed to assist the average computer user in detecting and removing malicious threats from their PC. SpyHunter has the ability to detect and remove rootkits, which are used to stealth install ransomware, rogue anti-spyware programs and other security threats.

Security for the Digital World Within an Ethical Framework  eBooks & eLearning

Posted by Underaglassmoon at May 27, 2017
Security for the Digital World Within an Ethical Framework

Security for the Digital World Within an Ethical Framework
IOS Press | English | 2017 | ISBN-10: 1614997233 | 36 pages | PDF | 2.26 mb

by Digital Enlightenment Forum (Corporate Author)

Modern High-security Locks: How To Open Them (repost)  eBooks & eLearning

Posted by libr at May 26, 2017
Modern High-security Locks: How To Open Them (repost)

Modern High-security Locks: How To Open Them by Steven Hampton
English | 2002 | ISBN-10: 1581602952 | PDF | 134 pages | 7,4 MB
Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017

Cyber Security 51 Handy Things To Know About Cyber Attacks: From the first Cyber Attack in 1988 to the WannaCry ransomware 2017. Tips and Signs to Protect your hardaware and software
English | 2017 | ISBN-10: 1546841164 | 38 pages | AZW3/PDF/EPUB (conv) | 0.6 Mb

Advanced Client Security  eBooks & eLearning

Posted by naag at May 26, 2017
Advanced Client Security

Advanced Client Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 208 MB
Genre: eLearning | Language: English

The Russian Challenge to the European Security Environment [Repost]  eBooks & eLearning

Posted by hill0 at May 25, 2017
The Russian Challenge to the European Security Environment [Repost]

The Russian Challenge to the European Security Environment by Roger E. Kanet
English | 4 May 2017 | ISBN: 3319507745 | 290 Pages | PDF | 6.61 MB

“Roger Kanet, a respected expert on the Soviet Union and post-Soviet Russia, has assembled a stellar team of scholars, from Russia and the West, to examine Russia’s policy toward Europe.
Enemies of Intelligence: Knowledge and Power in American National Security (repost)

Richard K. Betts, "Enemies of Intelligence: Knowledge and Power in American National Security"
English | ISBN: 0231138881 | edition 2007 | PDF | 265 pages | 1,25 mb

Special Operations from a Small State Perspective: Future Security Challenges  eBooks & eLearning

Posted by AvaxGenius at May 25, 2017
Special Operations from a Small State Perspective: Future Security Challenges

Special Operations from a Small State Perspective: Future Security Challenges By Gunilla Eriksson, Ulrica Pettersson
English | PDF | 2017 | 203 Pages | ISBN : 331943960X | 7.6 MB

“Over the past dozen years special operations forces (SOF) have been one of the few areas of growth and expansion in a number of militaries. This growth and expansion, however, has not been mirrored by a comparable one in academic inquiries into the subject.

Information Fusion for Cyber-Security Analytics (Repost)  eBooks & eLearning

Posted by AvaxGenius at May 15, 2017
Information Fusion for Cyber-Security Analytics (Repost)

Information Fusion for Cyber-Security Analytics By Izzat M Alsmadi, George Karabatis, Ahmed Aleroud
English | PDF,EPUB | 2017 | 379 Pages | ISBN : 3319442562 | 11.5 MB

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models.