Security Metaphors

Big Book of ACT Metaphors (repost)  eBooks & eLearning

Posted by roxul at Jan. 8, 2017
Big Book of ACT Metaphors (repost)

Jill A. Stoddard, Niloofar Afari, "Big Book of ACT Metaphors: A Practitioner's Guide to Experiential Exercises and Metaphors in Acceptance and Commitment Therapy"
2014 | ISBN-10: 1608825299 | 272 pages | PDF | 3 MB

Metaphors of Mind: An Eighteenth-Century Dictionary  eBooks & eLearning

Posted by Rare-1 at Oct. 1, 2016
Metaphors of Mind: An Eighteenth-Century Dictionary

Metaphors of Mind: An Eighteenth-Century Dictionary by Brad Pasanek
English | ISBN: 1421416883 | 2015 | PDF | 372 pages | 6.21 MB

Metaphors of Interaction  Graphics

Posted by lozor at March 7, 2009
Metaphors of Interaction

Metaphors of Interaction
JPEG 100 | 2564x3884 | 300 dpi | RGB | 178.77 Mb
The U.N. Exposed: How the United Nations Sabotages America's Security and Fails the World(Repost)

The U.N. Exposed: How the United Nations Sabotages America's Security and Fails the World by Eric Shawn
English | 2006 | ISBN: 1595230203 | 336 Pages | PDF | 5.27 MB

Understanding the Java Virtual Machine: Security [repost]  eBooks & eLearning

Posted by naag at Jan. 15, 2017
Understanding the Java Virtual Machine: Security [repost]

Understanding the Java Virtual Machine: Security
Size: 277MB | Duration: 1h 21m | Video: AVC (.mp4) 1024x576 15fps | Audio: AAC 44.1KHz 2ch
Genre: eLearning | Level: Intermediate | Language: English

Udemy - The Complete Cyber Security Course - Endpoint Protection (2017)  eBooks & eLearning

Posted by house23 at Jan. 15, 2017
Udemy - The Complete Cyber Security Course - Endpoint Protection (2017)

Udemy - The Complete Cyber Security Course - Endpoint Protection (2017)
MP4 | AVC 209kbps | English | 1280x720 | 30fps | 16h 30mins | AAC stereo 189kbps | 2.83 GB
Genre: Video Training

Learn a practical skill-set in securing laptops, desktops and mobile devices from all types of threats, including, advanced hackers, trackers, exploit kits, thieves and much more. On this course we cover end-point-protection, which is an extremely important and hot topic in cyber security right now! Go from a beginner to advanced in this easy to follow expert course.
Information Security Governance: A Practical Development and Implementation Approach(Repost)

Information Security Governance: A Practical Development and Implementation Approach by Krag Brotby
English | 2009 | ISBN: 0470131187 | 220 Pages | PDF | 3.04 MB

Safeguarding Homeland Security  eBooks & eLearning

Posted by tanas.olesya at Jan. 15, 2017
Safeguarding Homeland Security

Safeguarding Homeland Security: Governors and Mayors Speak Out by Simon Hakim
English | 30 Sept. 2009 | ISBN: 1441903704 | 292 Pages | PDF | 3 MB

The terrorist attack of September 11, 2001, and the natural disasters of Hurricanes Katrina and Rita demonstrated the challenges that governments face in initial response and recovery efforts.

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Security  eBooks & eLearning

Posted by AlenMiler at Jan. 15, 2017
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Security

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur by Gary Hall
English | 28 Dec. 2016 | ISBN: 1541289323 | 134 Pages | AZW3/MOBI/EPUB/PDF (conv) | 1.37 MB

Are you interested in learning about how to hack systems?

Wolves, Sheep, and Sheepdogs: A Leader's Guide to Information Security  eBooks & eLearning

Posted by AlenMiler at Jan. 15, 2017
Wolves, Sheep, and Sheepdogs: A Leader's Guide to Information Security

Wolves, Sheep, and Sheepdogs: A Leader's Guide to Information Security by Jim Shaeffer
English | 8 Jan. 2017 | ASIN: B01N4M9WJA | 62 Pages | AZW3/MOBI/EPUB/PDF (conv) | 3.7 MB

The angles of attack in today’s cyber security landscape evolve every moment. But even more ominous, there is no organization too small to escape being a target. However, there is an answer to these threats: a good sheepdog, alert to every danger and breach.