Security Framework

Automated Mobile Application Security Assessment with MobSF  eBooks & eLearning

Posted by C2U at Jan. 14, 2016
Automated Mobile Application Security Assessment with MobSF

Automated Mobile Application Security Assessment with MobSF
1 hours | Video: h264, yuv420p, 1280x720 30fps | Audio: aac, 44100 Hz, 2 ch | 225 MB
Genre: eLearning | Language: English

This course introduces Mobile Security Framework (MobSF) which automates your Mobile Application Security Assessments.

Pro Spring Security (repost)  

Posted by interes at May 24, 2014
Pro Spring Security (repost)

Pro Spring Security by Carlo Scarioni
English | ISBN: 1430248181 | 2013 | PDF | 340 pages | 7 MB

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Penetration Testing With the Metasploit Framework  eBooks & eLearning

Posted by FenixN at Oct. 27, 2016
Penetration Testing With the Metasploit Framework

Penetration Testing With the Metasploit Framework
HDRips | MP4/AVC, ~521 kb/s | 1280x720 | Duration: 03:23:05 | English: AAC, 128 kb/s (2 ch) | 984 MB
Genre: Development / Programming

An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities.
Cisco Network Admission Control: Nac Framework Architecture and Design v. 1

Cisco Network Admission Control: Nac Framework Architecture and Design v. 1 by Denise Helfrich
English | 8 Dec. 2006 | ISBN: 1587052415 | 264 Pages | PDF | 2 MB

Today, a variety of security challenges affect all businesses regardless of size and location. Companies face ongoing challenges with the fight against malware such as worms, viruses, and spyware. Today’s mobile workforce attach numerous devices to the corporate network that are harder to control from a security policy perspective. These host devices are often lacking antivirus updates and operating system patches, thus exposing the entire network to infection.

ASP.NET Security Secrets Revealed [repost]  

Posted by FenixN at May 14, 2015
ASP.NET Security Secrets Revealed [repost]

ASP.NET Security Secrets Revealed
WEBRips | WMV/WMV3, ~384 kb/s | 1024x768 | Duration: 3 Hours 24 mins | English: WMA, 192 kb/s (2 ch) | 905 MB
Genre: Development / Programming

ASP.NET is full of little nuggets of security goodness, often doing their work in the background without you even noticing and other times secreted away within obscure corners of the framework. This course is about building familiarity with the breadth of framework features after which the developer can go off and build further knowledge through existing Pluralsight courses that really drill deep into the detail.

.NET Framework Security by Brian A. LaMacchia [Repost]  

Posted by tanas.olesya at Feb. 28, 2015
.NET Framework Security by Brian A. LaMacchia [Repost]

.NET Framework Security by Brian A. LaMacchia
English | Apr 24, 2002 | ISBN: 067232184X | 816 Pages | CHM | 4 MB

.NET Framework Security contains security features of the .NET Framework and Common Language Runtime. The focus is on the new technologies introduced with .NET, with treatment of existing technologies as leveraged by .NET (but not those existing technologies themselves)
Humanitarian Crises, Intervention and Security: A Framework for Evidence-Based Programming

Humanitarian Crises, Intervention and Security: A Framework for Evidence-Based Programming (Routledge Studies in Intervention and Statebuilding) by Liesbet Heyse, Andrej Zwitter, Rafael Wittek, Joost Herman
2015 | ISBN: 0415830397 | English | 238 pages | PDF | 1 MB

.NET Development Security Solutions (repost)  

Posted by MoneyRich at Dec. 13, 2014
.NET Development Security Solutions (repost)

.NET Development Security Solutions by John Paul Mueller
English | September 19, 2003 | ISBN: 0782142664 | 448 pages | CHM | 9 MB

The .NET Framework offers new, more effective ways to secure your Web and LAN based applications. ".NET Development Security Solutions" uses detailed, code intensive examples lots of them to teach you the right techniques for most scenarios you're likely to encounter. This is not an introduction to security; it's an advanced cookbook that shows experienced programmers how to meet tough security challenges. Recognize and avoid dangerous traps including holes in .NET. Work fluently with both role based and code access security. Maximize the security advantages of policies and code groups.Promote security using Active Directory. Secure data with .NET cryptographic techniques. Meet the toughest LAN security requirements. Tackle special security issues associated with Web and wireless applications. Implement Win32 API security in managed applications. Uniting this instruction is a coherent, cohesive mindset that will help you take the human factor into account at every step. You'll become technically proficient with all the tools at your disposal and, at the same time, you'll learn to make your solutions more powerful by crafting them in ways that dovetail with users needs and foibles and anticipate cracker exploits.
Regional Powers and Security Orders: A Theoretical Framework

Regional Powers and Security Orders: A Theoretical Framework by Robert Stewart-Ingersoll and Derrick Frazier
English | 2011 | ISBN: 0415569192, 0415631785 | 296 pages | PDF | 1 MB
Crime Prevention, Security and Community Safety Using the 5Is Framework (repost)

Crime Prevention, Security and Community Safety Using the 5Is Framework (Crime Prevention and Security Management) by Paul Ekblom
English | ISBN 10: 0230210368 | 2010 | PDF | 288 pages | 3,3 MB

The potential of crime prevention, security and community safety is constrained by implementation failure. This book presents a carefully-designed system of good practice, the 5Is, which handles the complexities of real world prevention, this aims to improve the performance of prevention, and advance process evaluation.