Cyber Junkie

My Fair Junkie: A Memoir of Getting Dirty and Staying Clean  eBooks & eLearning

Posted by tarantoga at Oct. 18, 2017
My Fair Junkie: A Memoir of Getting Dirty and Staying Clean

Amy Dresner, "My Fair Junkie: A Memoir of Getting Dirty and Staying Clean"
ISBN: 0316430951 | 2017 | EPUB | 256 pages | 2 MB

Enhancing the Role of Insurance in Cyber Risk Management  eBooks & eLearning

Posted by hill0 at Dec. 17, 2017
Enhancing the Role of Insurance in Cyber Risk Management

Enhancing the Role of Insurance in Cyber Risk Management by Organization for Economic Cooperation and Development
English | 2017 | ISBN: 9264282130 | 142 Pages | PDF | 2.56 MB

The increasing use of digital technologies in economic activities - while creating significant benefits in terms of productivity and efficiency - is also leading to significant risks including the potential
Digital World War: Islamists, Extremists, and the Fight for Cyber Supremacy [Audiobook]

Haroon K. Ullah,‎ Derek Shetterly (Narrator), "Digital World War: Islamists, Extremists, and the Fight for Cyber Supremacy"
ASIN: B077TY7M8Q | 2017 | MP3@64 kbps | ~07:10:00 | 204 MB

Stories from the Dirt: Indiscretions of an Adventure Junkie  eBooks & eLearning

Posted by First1 at Dec. 11, 2017
Stories from the Dirt: Indiscretions of an Adventure Junkie

Stories from the Dirt: Indiscretions of an Adventure Junkie by John Long
English | September 1st, 2017 | ASIN: B072FQD51V, ISBN: 1493030957 | 215 Pages | EPUB | 2.47 MB

Riding tubes in Venezuela. BASE jumping in Europe. Climbing big walls in Yosemite. Riding bulls in Texas.

Cyber Security for Small Business  eBooks & eLearning

Posted by naag at Dec. 10, 2017
Cyber Security for Small Business

Cyber Security for Small Business
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | Lec: 27 | 96 MB
Genre: eLearning | Language: English

Upgrade your Cyber Security knowledge to protect your business from Cyber crime such as Ransomware
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations By Morey J. Haber
English | PDF,EPUB | 2017 (2018 Edition) | 261 Pages | ISBN : 1484230477 | 5 MB

See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.

CreativeMarket - Cyber Monday Shop Deal!  Graphics

Posted by angus77 at Nov. 30, 2017
CreativeMarket - Cyber Monday Shop Deal!

CreativeMarket - Cyber Monday Shop Deal!
PowerPoint PPTX | 4.2 GB

CreativeMarket - Cyber Monday SALE  Graphics

Posted by angus77 at Nov. 30, 2017
CreativeMarket - Cyber Monday SALE

CreativeMarket - Cyber Monday SALE
OTF, WOFF | 64 MB
Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop (Forum on Cyber Resilience)

Software Update as a Mechanism for Resilience and Security: Proceedings of a Workshop (Forum on Cyber Resilience) by Engineering, and Medicine National Academies of Sciences
English | Oct. 25, 2017 | ISBN: 0309462886 | 97 Pages | PDF | 6 MB

Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.

Cyber-Assurance for the Internet of Things  eBooks & eLearning

Posted by arundhati at Nov. 24, 2017
Cyber-Assurance for the Internet of Things

Tyson T. Brooks, "Cyber-Assurance for the Internet of Things"
2017 | ISBN-10: 1119193869 | 520 pages | EPUB | 13 MB