Security Metaphors

Metaphors of Mind: An Eighteenth-Century Dictionary  eBooks & eLearning

Posted by Rare-1 at Oct. 1, 2016
Metaphors of Mind: An Eighteenth-Century Dictionary

Metaphors of Mind: An Eighteenth-Century Dictionary by Brad Pasanek
English | ISBN: 1421416883 | 2015 | PDF | 372 pages | 6.21 MB

Metaphors of Interaction  Graphics

Posted by lozor at March 7, 2009
Metaphors of Interaction

Metaphors of Interaction
JPEG 100 | 2564x3884 | 300 dpi | RGB | 178.77 Mb
Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing

Hacking: Top Online Handbook in Exploitation of Computer Hacking, Security, and Penetration Testing (Fortran, Python, Android, XML 1) by PG Wizard Books
English | 15 Mar. 2017 | ASIN: B06XPRYW1G | 44 Pages | AZW3 | 42.39 KB

Formal Aspects of Security and Trust (repost)  eBooks & eLearning

Posted by interes at March 25, 2017
Formal Aspects of Security and Trust (repost)

Formal Aspects of Security and Trust by Pierpaolo Degano, Sandro Etalle, Joshua Guttman
English | 2011 | ISBN: 3642197507 | 249 pages | PDF | 2,8 MB

ITPro - CompTIA Security+ (SY0-401) (2017)  eBooks & eLearning

Posted by house23 at March 25, 2017
ITPro - CompTIA Security+ (SY0-401) (2017)

ITPro - CompTIA Security+ (SY0-401) (2017)
MP4 | AVC 792kbps | English | 1280x720 | 30fps | 25h 32mins | AAC stereo 112kbps | 11.15 GB
Genre: Video Training

CompTIA Security+ professionals help to implement, administer and maintain a secure computing environment for any organization. The certification is designed for those with a few years of experience in IT administration with a focus on security that want to help protect and secure their network. Viewers will hear about different topics and objectives discussed in this course including different areas of security, threats and vulnerabilities, cryptography, and other additional topics and will attain knowledge and skills to identify security issues, to mitigate and deter threats, to apply security controls and implement and maintain an organizations security policies.

Security for Wireless Sensor Networks (Repost)  eBooks & eLearning

Posted by AvaxGenius at March 25, 2017
Security for Wireless Sensor Networks (Repost)

Security for Wireless Sensor Networks By Donggang Liu, Peng Ning
English | PDF | 2007 | 214 Pages | ISBN : 0387327231 | 42.89 MB

Wireless sensor networks have recently received a high level of attention due to their wide applications in military and civilian operations.
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

From Hacking to Report Writing: An Introduction to Security and Penetration Testing by Robert Svensson
English | 8 Nov. 2016 | ISBN: 1484222822 | 216 Pages | EPUB (True) | 2.8 MB

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy.
Hacking: The Ultimate Beginners to Experts Guide to Computer Hacking, Penetration Testing and Basic Security Coding

Hacking: The Ultimate Beginners to Experts Guide to Computer Hacking, Penetration Testing and Basic Security Coding
2017 | English | ISBN-10: 1544741480 | 30 pages | PDF + EPUB (conv) | 0.5 Mb

Security Spy 4.1.1  Software

Posted by Givaraa at March 25, 2017
Security Spy 4.1.1

Security Spy 4.1.1 | MacOSX | 13.1 MB

SecuritySpy will enable you to quickly set up an effective video surveillance (CCTV) system. If you plan to install the base home or a large professional system, SecuritySpy provides a reliable solution. SecuritySpy is working with a wide range of cameras to suit every need, from traditional analog cameras to the latest high-definition network camera, offering superior quality video at a resolution of megapixels.

Security and the Networked Society  eBooks & eLearning

Posted by hill0 at March 25, 2017
Security and the Networked Society

Security and the Networked Society by Mark Gregory
English | 7 Nov. 2013 | ISBN: 3319023896 | 316 Pages | EPUB (True) | 3.39 MB

This book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy.