Loading...
Done
Home > eBooks > Security related
Cryptography: An Introduction (repost)
Posted By : joemuscat | Date : 01 Mar 2022 08:01:54 | Comments : 0

Cryptography: An Introduction
McGraw Hill | English | 2002 / 2009 | ISBN: 0077099877 | 433 pages | PDF | 1,6 MB
The Art of Deception: Controlling the Human Element of Security
Posted By : tot167 | Date : 01 Mar 2022 06:02:29 | Comments : 0

Kevin Mitnick, "The Art of Deception: Controlling the Human Element of Security"
Wiley | 2002 | ISBN: 0471237124, 0965713466 | 304 pages | PDF | 3,6 MB
Microsoft Log Parser Toolkit: A complete toolkit for Microsoft's undocumented log analysis tool (Repost)
Posted By : yurii1982 | Date : 27 Feb 2022 19:59:42 | Comments : 0

Microsoft Log Parser Toolkit: A complete toolkit for Microsoft's undocumented log analysis tool
Publisher: Syngress | ISBN: 1932266526 | edition 2005 | PDF | 465 pages | 83,8 mb

Do you want to find Brute Force Attacks against your Exchange Server? Would you like to know who is spamming you? Do you need to monitor the performance of your IIS Server? Are there intruders out there you would like to find? Would you like to build user logon reports from your Windows Server? Would you like to export your logs to XML? Would you like working scripts to automate all of these tasks and many more for you? If so, this book is for you... "Microsoft Log Parser Toolkit" is co-authored by Microsoft's Log Parser developer providing a complete reference to this SQL-Query driven log analysis tool. The book and accompanying Web site also provide dozens of customized, working scripts, queries, and templates for Windows Server, Snort IDS, Exchange Server, IIS, ISA Server, Snort and more.
Truth, Lies, and Online Dating: Secrets to Finding Romance on the Internet
Posted By : lenami | Date : 27 Feb 2022 13:28:13 | Comments : 1

Truth, Lies, and Online Dating: Secrets to Finding Romance on the Internet
Publisher: Course Technology PTR | ISBN: 1592009166 | edition 2005 | PDF | 297 pages | 11,1 mb

Online dating represents an amazing new way to meet people, but it requires technology skills in addition to social skills. "Truth, Lies, and Online Dating" shows you how you can effectively use your PC, digital camera, word processor and other PC-based tools to effectively market yourself and communicate who you are -- and who you are looking for. It teaches the mechanics of online dating services and shows you how to put each service's search engines to work to find the best dates. Learn how you can try services first without having to subscribe, and how to find dating sources that match your lifestyle. Finally, you'll explores the darker side of online dating, learning how to spot people who may not be telling the truth about themselves and even using background check services to verify the identity of the person you are interested in.
Revolutionary and Dissident Movements of the World (Repost)
Posted By : makccc960 | Date : 27 Feb 2022 10:38:31 | Comments : 0

Revolutionary and Dissident Movements of the World
Publisher: Gale Cengage | ISBN: 0954381122 | edition 2004 | PDF | 577 pages | 10,6 mb

A reference tool for understanding the sources of political instability and terrorism throughout the world. Compiled by some 80 contributors from around the world, this 4th edition covers all significant organizations that operate outside the permitted sphere of political activity. These range from violent terrorist units in democratic societies to dissident groups operating in authoritarian states. The book covers every country in the world plus an international section on groups operating beyond the boundaries of the nation state. Entries on organisations describe their leadership, goals, support, history and impact.
Security and Privacy in Mobile Information and Communication Systems
Posted By : tot167 | Date : 27 Feb 2022 06:41:22 | Comments : 0

Andreas U. Schmidt, Shiguo Lian, "Security and Privacy in Mobile Information and Communication Systems"
Springer | 2009 | ISBN: 3642044336 | 289 pages | PDF | 3,4 MB
Firewalls and Internet Security: Repelling the Wily Hacker (Repost)
Posted By : nazarchuk | Date : 25 Feb 2022 14:10:35 | Comments : 0

Firewalls and Internet Security: Repelling the Wily Hacker
Publisher: Addison-Wesley Professional | ISBN: 020163466X | edition 2003 | PDF | 464 pages | 56,4 mb

Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it. In addition, there is vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security. With Firewalls and Internet Security, anyone will be well equipped to provide their organization with effective protection from the wily Internet hacker.
Classification and Clustering for Knowledge Discovery (Studies in Computational Intelligence)
Posted By : nazarchuk | Date : 23 Feb 2022 16:03:40 | Comments : 0

Classification and Clustering for Knowledge Discovery (Studies in Computational Intelligence)
Publisher: Springer | ISBN: 3540260730 | edition 2005 | PDF | 356 pages | 14,3 mb

Knowledge Discovery today is a significant study and research area. In finding answers to many research questions in this area, the ultimate hope is that knowledge can be extracted from various forms of data around us. This book covers recent advances in unsupervised and supervised data analysis methods in Computational Intelligence for knowledge discovery. In its first part the book provides a collection of recent research on distributed clustering, self organizing maps and their recent extensions. If labeled data or data with known associations are available, we may be able to use supervised data analysis methods, such as classifying neural networks, fuzzy rule-based classifiers, and decision trees. Therefore this book presents a collection of important methods of supervised data analysis. "Classification and Clustering for Knowledge Discovery" also includes variety of applications of knowledge discovery in health, safety, commerce, mechatronics, sensor networks, and telecommunications.
Home Network Security Simplified (Repost)
Posted By : makccc960 | Date : 21 Feb 2022 17:31:43 | Comments : 1

Home Network Security Simplified
Publisher: Cisco Press | ISBN: 1587201631 | edition 2006 | CHM | 224 pages | 14,1 mb

Home Network Security Simplified is a straightforward, graphic-based home network security reference book for the everyday user. Home Network Security Simplified takes novice users from no or limited understanding of network security to the point where they can use their network with the peace of mind that comes with knowing that your network and your information is secure. Home Network Security is organized by the guiding principle of Ten Easy Steps to a Safte Home Network. The book will provide an understanding of the various types of security threats (what they are, how they work), a series of tutorials on security strategy for each of these threats, and a step-by-step guide to implementing security across the network. Armed with an understanding of home networking security concepts, users can take advantage of a wide array of benefits including - Understanding the different types of security threats - Securing their networks against those threats - Recognizing if someone has attempted to breach their network - Staying abreast of emerging threats.
Official (ISC)2 Guide to the CISSP-ISSEP CBK (Repost)
Posted By : makccc960 | Date : 20 Feb 2022 19:30:40 | Comments : 0

Official (ISC)2 Guide to the CISSP-ISSEP CBK
Publisher: Auerbach Publications | ISBN: 084932341X | edition 2005 | PDF | 1025 pages | 21,6 mb

The Official (ISC)2 Guide to the CISSP-ISSEP CBK provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations.
Justification for US Military Intervention in Cuba
Posted By : spmspm | Date : 20 Feb 2022 14:18:06 | Comments : 2

Justification for US Military Intervention in Cuba
United States military | Pages: 15 | 1962 | ISBN no | PDF | 0,8 MB

very interesting document for understanding Cuban Crisis...
Bigelow's Virus Troubleshooting Pocket Reference (Pocket References (McGraw-Hill))
Posted By : can.con96 | Date : 20 Feb 2022 14:09:20 | Comments : 0

Bigelow's Virus Troubleshooting Pocket Reference (Pocket References (McGraw-Hill))
McGraw-Hill | August 7 2000 | 267 pages | English | ISBN : 0072126272,0072126273 | PDF | 1.4MB

FM 5-250 EXPLOSIVES AND DEMOLITIONS
Posted By : spmspm | Date : 20 Feb 2022 14:04:44 | Comments : 1

FM 5-250 EXPLOSIVES AND DEMOLITIONS
United States military | Pages: 274 | 1992 | ISBN no | PDF | 8 MB

The purpose of this manual is to provide technical information on explosives used by United States military forces and their most frequent applications. This manual does not discuss all applications but presents the most current information on demolition procedures used in most situations.
Best Internet Links
Posted by :: Alex | Date :: Aug 20, 2021 19:05:00 | [ 34 comments ]


Information Security Governance
Posted By : tot167 | Date : 19 Feb 2022 11:54:11 | Comments : 0

S.H. Solms, Rossouw Solms, "Information Security Governance"
Springer | 2008 | ISBN: 0387799834 | 138 pages | PDF | 1,6 MB
The Art of Deception: Controlling the Human Element of Security (Repost)
Posted By : JohnGenry | Date : 18 Feb 2022 17:43:29 | Comments : 0

The Art of Deception: Controlling the Human Element of Security
Publisher: Wiley | ISBN: 076454280X | edition 2003 | PDF | 577 pages | 13,3 mb

Mitnick is the most famous computer hacker in the world. Since his first arrest in 1981, at age 17, he has spent nearly half his adult life either in prison or as a fugitive. He has been the subject of three books and his alleged 1982 hack into NORAD inspired the movie War Games. Since his plea-bargain release in 2000, he says he has reformed and is devoting his talents to helping computer security. It's not clear whether this book is a means toward that end or a, wink-wink, fictionalized account of his exploits, with his name changed to protect his parole terms. Either way, it's a tour de force, a series of tales of how some old-fashioned blarney and high-tech skills can pry any information from anyone. As entertainment, it's like reading the climaxes of a dozen complex thrillers, one after the other. As a security education, it's a great series of cautionary tales; however, the advice to employees not to give anyone their passwords is bland compared to the depth and energy of Mitnick's descriptions of how he actually hacked into systems. As a manual for a would-be hacker, it's dated and nonspecific better stuff is available on the Internet but it teaches the timeless spirit of the hack. Between the lines, a portrait emerges of the old-fashioned hacker stereotype: a socially challenged, obsessive loser addicted to an intoxicating sense of power that comes only from stalking and spying.
DONATE AVAXHOME:

Donate please!