Ron Underwood | La fee clochette et la creature legendaire | Download

Cyber Security and Privacy


Cyber Security and Privacy

Frances Cleary, Massimo Felici, "Cyber Security and Privacy"
2014 | pages: 180 | ISBN: 3319125737 | PDF | 17,1 mb

Download Now

Implementing Physical Security

Implementing Physical Security

Implementing Physical Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours 44M | 227 MB
Genre: eLearning | Language: English

Physical security controls protect digital assets that are processed and stored on physical equipment, including smartphones. In this course, you'll learn how to ensure the security and availability of IT systems. Software required: EXO5 and…
Download Now

Muslims in Putin's Russia Discourse on Identity, Politics, and Security


Muslims in Putin's Russia Discourse on Identity, Politics, and Security

Muslims in Putin's Russia: Discourse on Identity, Politics, and Security by Simona E. Merati
English | 21 Jun. 2017 | ISBN: 3319535196 | 256 Pages | PDF | 11.94 MB
This book offers a novel interpretation of Russian contemporary discourse on Islam and its influence on Russian state policies. It shifts the analytical perspective from the discussion about Russia's Islam as a potential security threat

Download Now

Nsauditor Network Security Auditor 3.0.20.0

Nsauditor Network Security Auditor 3.0.20.0

Nsauditor Network Security Auditor 3.0.20.0 | 15 Mb
Nsauditor Network Security Auditor is a network security and vulnerability scanner that allows auditing and monitoring network computers for possible vulnerabilities, checking network for all potential methods that a hacker might use to attack it and create a report of potential problems that were found. Nsauditor is a complete networking software package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more.
Download Now

Security Task Manager 2.1i Multilingual

Security Task Manager 2.1i Multilingual


Security Task Manager 2.1i Multilingual | 3 Mb
Security Task Manager displays detailed information about all running processes (applications, DLLs, BHOs, and services). For each process, it improves on ShiChuang Task Manager, providing a security risk rating, a process description, file path, CPU usage graph, start time, embedded hidden functions (for example keyboard monitoring, autostart entry, and browser supervision or manipulation), and process type, such as visible window, systray program, DLL, and IE plug-in. The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger. It also deletes traces of your Internet and computer activity, prevents keyboard input monitoring, and warns you when the registry is changed.
Download Now

Defending the Digital Frontier: A Security Agenda

Defending the Digital Frontier: A Security Agenda

Ernst & Young LLP, Mark W. Doll, Sajai Rai, "Defending the Digital Frontier: A Security Agenda"
2002 | pages: 259 | ISBN: 0471221449 | PDF | 3,0 mb
Download Now

Foundations of IT Security: Operating System Security (2017)

Foundations of IT Security: Operating System Security (2017)
Foundations of IT Security: Operating System Security
Duration: 1h 23m | Video: AVC (.mp4) 1280x720 15&30fps | Audio: AAC 48KHz 2ch | 220MB
Genre: eLearning | Language: English

Download Now

Offensive Security - Penetration Testing With Kali

Offensive Security - Penetration Testing With Kali
Offensive Security - Penetration Testing With Kali
English | Size: 0.98 GB
Category: CBTs

Penetration Testing with Kali (PWK) is a self-paced online pen testing course designed for network administrators and security professionals who want to take a serious and meaningful step into the world of professional penetration testing. This unique penetration testing training course introduces students to the latest ethical hacking tools and techniques, including remote, virtual penetration testing labs for practicing the course materials. Penetration Testing with Kali Linux simulates a full penetration test from start to finish, by injecting the student into a target-rich, diverse, and vulnerable network environment
Download Now

Avast! Internet Security / Premier Antivirus v17.5.23.02 Final

Avast! Internet Security / Premier Antivirus v17.5.23.02 Final
Avast! Internet Security / Premier Antivirus v17.5.23.02 Final | File size: 588 MB

Our most advanced security suite adds military-grade data shredding and automatic software updates in addition to antivirus, firewall, and Home Network Security. avast! is only the most trusted name in antivirus, actively protecting more than 200 million PCs, Macs and Androids.

Download Now

Network Security through Data Analysis, 2nd Edition [Early Rlease]

Network Security through Data Analysis, 2nd Edition [Early Rlease]

Network Security through Data Analysis, 2nd Edition
English | 2017 | ISBN-10: 1491962844 | 400 pages | PDF + EPUB + MOBI(conv) | 7 Mb
Download Now