Iobit 360 Security

Societies in Transition: Economic, Political and Security Transformations in Contemporary Europe (Repost)

Societies in Transition: Economic, Political and Security Transformations in Contemporary Europe by Savvas Katsikides,‎ Pavlos I. Koktsidis
Language: English | 2015 | ISBN: 3319138138 | 234 pages | PDF | 3,7 MB

This edited volume discusses critically the social implications of current structural transformations in Europe within the broader context of the global financial crisis.
The Maritime Turn in EU Foreign and Security Policies: Aims, Actors and Mechanisms of Integration

The Maritime Turn in EU Foreign and Security Policies: Aims, Actors and Mechanisms of Integration By Marianne Riddervold
English | PDF,EPUB | 2018 | 244 Pages | ISBN : 3319665979 | 2.75 MB

This book provides the first substantial treatment of the maritime foreign and security policies of the European Union. Its findings add to the literature by a comparative, theoretically informed analysis of EU maritime foreign and security policies across five cases: the EU’s Maritime Security Strategy and action plan; the EU’s two naval missions, Atalanta and Sophia; EU Arctic policies, and; EU policies towards the Maritime Labour Convention.

Security Awareness: Mobile Devices  eBooks & eLearning

Posted by naag at Jan. 19, 2018
Security Awareness: Mobile Devices

Security Awareness: Mobile Devices
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour | 176 MB
Genre: eLearning | Language: English

Security Task Manager 2.1k Multilingual  Software

Posted by melt_ at Jan. 18, 2018
Security Task Manager 2.1k Multilingual

Security Task Manager 2.1k Multilingual | 3 Mb

Security Task Manager displays detailed information about all running processes (applications, DLLs, BHOs, and services). For each process, it improves on Windows Task Manager, providing a security risk rating, a process description, file path, CPU usage graph, start time, embedded hidden functions (for example keyboard monitoring, autostart entry, and browser supervision or manipulation), and process type, such as visible window, systray program, DLL, and IE plug-in. The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger. It also deletes traces of your Internet and computer activity, prevents keyboard input monitoring, and warns you when the registry is changed.
Raising a Secure Child: How Circle of Security Parenting Can Help You Nurture Your Child's Attachment [Audiobook]

Raising a Secure Child: How Circle of Security Parenting Can Help You Nurture Your Child's Attachment, Emotional Resilience, and Freedom to Explore [Audiobook] by Bert Powell, Glen Cooper, Kent Hoffman, Daniel J. Siegel, Christine M. Benton
English | October 10th, 2017 | ASIN: B075VDN9PX, ISBN: 1541460529 | MP3@64 kbps | 9 hrs 17 mins | 255.49 MB
Narrator: Coleen Marlo

Today's parents are constantly pressured to be perfect. But in striving to do everything right, we risk missing what children really need for lifelong emotional security. Now the simple, powerful "Circle of Security" parenting strategies that Kent Hoffman, Glen Cooper, and Bert Powell have taught thousands of families are available in self-help form for the first time.
Human Trafficking and Security in Southern Africa: The South African and Mozambican Experience

Human Trafficking and Security in Southern Africa: The South African and Mozambican Experience By Richard Obinna Iroanya
English | PDF,EPUB | 2018 | 263 Pages | ISBN : 3319719874 | 3.5 MB

This book investigates the links between human trafficking and national security in Southern Africa. Human trafficking violates borders, supports organised crime and corrupts border officials, and yet policymakers rarely view the persistence of human trafficking as a security issue. Adopting an expanded conceptualisation of security to encompass the individual as well as the state, Richard Obinna Iroanya lays the groundwork for understanding human trafficking as a security threat. He outlines the conditions and patterns of human trafficking globally before moving into detailed case studies of South Africa and Mozambique. Together, these case studies bring into focus the lives of the ‘hidden population’ in the region, with analysis and policy recommendations for combating a global phenomenon.

Security Awareness: In Practice and Review  eBooks & eLearning

Posted by naag at Jan. 18, 2018
Security Awareness: In Practice and Review

Security Awareness: In Practice and Review
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hours | 127 MB
Genre: eLearning | Language: English

You see it almost daily on the news, another cyber attack and the release of sensitive data. Keeping updated and following basic good practices will help prevent the disclosure of sensitive information.

Group Testing Theory in Network Security: An Advanced Solution  eBooks & eLearning

Posted by AvaxGenius at Jan. 17, 2018
Group Testing Theory in Network Security: An Advanced Solution

Group Testing Theory in Network Security: An Advanced Solution By My T. Thai
English | EPUB | 2012 | 86 Pages | ISBN : 1461401275 | 1.5 MB

Group Testing Theory in Network Security explores a new branch of group testing theory with an application which enhances research results in network security. This brief presents new solutions on several advanced network security problems and mathematical frameworks based on the group testing theory, specifically denial-of-service and jamming attacks. A new application of group testing, illustrated in this text, requires additional theories, such as size constraint group testing and connected group testing. Included in this text is a chapter devoted to discussing open problems and suggesting new solutions for various network security problems. This text also exemplifies the connection between mathematical approaches and practical applications to group testing theory in network security. This work will appeal to a multidisciplinary audience with interests in computer communication networks, optimization, and engineering.

Security Awareness: Malware at Work  eBooks & eLearning

Posted by naag at Jan. 17, 2018
Security Awareness: Malware at Work

Security Awareness: Malware at Work
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1 Hour 13M | 282 MB
Genre: eLearning | Language: English

Often disguised as something that you want, malware attacks are not always obvious. Learn how to prevent malware attacks from disrupting or disabling your system through simple popup ads or links, and from holding your data for ransom.

Computer Security: Principles and Practice, 3rd Edition (repost)  eBooks & eLearning

Posted by arundhati at Jan. 17, 2018
Computer Security: Principles and Practice, 3rd Edition (repost)

William Stallings and Lawrie Brown, "Computer Security: Principles and Practice, 3rd Edition"
2015 | ISBN: 0133773922 | 814 pages | PDF | 14 MB