Security Without Obscurity

Security without Obscurity: A Guide to PKI Operations  eBooks & eLearning

Posted by AlenMiler at Feb. 15, 2016
Security without Obscurity: A Guide to PKI Operations

Security without Obscurity: A Guide to PKI Operations by Jeff Stapleton
English | Feb. 19, 2016 | ISBN: 1498707475 | 359 Pages | PDF (True) | 5.68 MB

Most books on public key infrastructure (PKI) seem to focus on asymmetric cryptography, X.509 certificates, certificate authority (CA) hierarchies, or certificate policy (CP), and certificate practice statements.
Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity

J.J. Stapleton, "Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity"
English | ISBN: 1466592141 | 2014 | 355 pages | PDF | 4 MB

Take Control of Security for Mac Users  eBooks & eLearning

Posted by AlenMiler at Aug. 4, 2015
Take Control of Security for Mac Users

Take Control of Security for Mac Users by Joe Kissell
English | 24 May 2015 | ASIN: B00YNXRJNQ | 178 Pages | EPUB/MOBI/PDF (True) | 10.83 MB

Do credit card fraud, hacking, identity theft, and online shopping and banking risks concern you? How about the dangers of malware, phishing, and Wi-Fi sniffing when you use your Mac? You are not alone - these dangers top the lists of security concerns in many surveys.

Multicast and Group Security (Repost)  eBooks & eLearning

Posted by step778 at July 13, 2015
Multicast and Group Security (Repost)

Thomas Hardjono, Lakshminath R. Dondeti, "Multicast and Group Security"
2003 | pages: 330 | ISBN: 1580533426 | PDF | 2,3 mb

ESET File Security 6.0.12035.1  Software

Posted by art_links at May 19, 2015
ESET File Security 6.0.12035.1

ESET File Security 6.0.12035.1 | 157.53 Mb

ESET File Security for Microsoft Windows Server efficiently protect file servers against all types of malicious software. The product is optimized to work in a server environment to ensure data security without compromising performance. Protection against viruses and spyware is one of the main functions of the software ESET File Security. In the traditional version, this protection prevents malicious attacks on the computer by controlling file, email and Internet connections. If there is a threat, module antivirus can eliminate it, first blocking and then cleaning, deleting or moving it to quarantine.

Spring Security 3.x Cookbook  eBooks & eLearning

Posted by nebulae at May 10, 2014
Spring Security 3.x Cookbook

Anjana Mankale, "Spring Security 3.x Cookbook"
English | ISBN: 1782167528 | 2013 | 300 pages | PDF, EPUB, MOBI | 28 MB

Network Security: A Beginner's Guide (Repost)  eBooks & eLearning

Posted by enmoys at June 7, 2013
Network Security: A Beginner's Guide (Repost)

Network Security: A Beginner's Guide By Eric Maiwald
2001 | 400 Pages | ISBN: 0072133244 | PDF | 23 MB

Network Security: A Beginner's Guide (Repost)  eBooks & eLearning

Posted by lout at Dec. 13, 2010
Network Security: A Beginner's Guide (Repost)

Network Security: A Beginner's Guide By Eric Maiwald
Publisher: Mc/Gra w-H ill 2001 | 400 Pages | ISBN: 0072133244 | PDF | 11 MB

Steve Kalman, «Web Security Field Guide»  eBooks & eLearning

Posted by Alexpal at April 22, 2006
Steve Kalman, «Web Security Field Guide»

Steve Kalman, «Web Security Field Guide»
Cisco Press | ISBN 1587050927 | 2002 Year | PDF | 15 Mb | 608 Pages

cbtnuggets - Penetration Testing with Linux Tools (Repost)  eBooks & eLearning

Posted by serpmolot at July 8, 2016
cbtnuggets - Penetration Testing with Linux Tools (Repost)

cbtnuggets - Penetration Testing with Linux Tools (Repost)
English | mp4 | H264 1280x720 | AAC 2 ch | 11 hrs | 2.58 GB
eLearning | Systems | Level: Intermediate