Qualys Security

Programmer's Ultimate Security DeskRef: Your programming security encyclopedia  eBooks & eLearning

Posted by Willson at Dec. 2, 2016
Programmer's Ultimate Security DeskRef: Your programming security encyclopedia

James C Foster, "Programmer's Ultimate Security DeskRef: Your programming security encyclopedia"
English | 2004 | ISBN: 1932266720 | 700 pages | PDF | 4.5 MB

Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security  eBooks & eLearning

Posted by Willson at Dec. 2, 2016
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security

Praphul Chandra, "Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security"
English | 2005 | ISBN: 0750677465 | 272 pages | PDF | 5 MB

Cyber Security Awareness: Electronic Commerce Security  eBooks & eLearning

Posted by naag at Dec. 2, 2016
Cyber Security Awareness: Electronic Commerce Security

Cyber Security Awareness: Electronic Commerce Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 47M | 113 MB
Genre: eLearning | Language: English

With e-commerce gaining ground as the preferred means of business, learn the dos and don'ts of e-commerce. This course will give you a great foundation in e-commerce cyber-security.
Practical Information Security Management: A Complete Guide to Planning and Implementation

Tony Campbell, "Practical Information Security Management: A Complete Guide to Planning and Implementation"
English | ISBN: 1484216849 | 2017 | 237 pages | PDF | 9 MB

Learning Path: Network and Cloud Security  eBooks & eLearning

Posted by FenixN at Nov. 30, 2016
Learning Path: Network and Cloud Security

Learning Path: Network and Cloud Security
HDRips | MP4/AVC, ~270 kb/s | 1280x720 | Duration: 35 hours | English: AAC, 128 kb/s (2 ch) | 9.15 GB
Genre: Development / Programming / Secutrity

If you share resources across your network or the cloud, you need a firm grasp of all of the security implications. In this Learning Path, you’ll get hands-on experience securing your infrastructure while learning about risk assessment and management, sensitive data, computer forensics, penetration testing, and much more. By the end of this course, you’ll know how to secure your data and keep it that way.

A Tragedy of Arms: Military and Security Developments in the Maghreb  eBooks & eLearning

Posted by mapusi at Nov. 30, 2016
A Tragedy of Arms: Military and Security Developments in the Maghreb

A Tragedy of Arms: Military and Security Developments in the Maghreb by Anthony H. Cordesman
English | 30 Nov. 2001 | ISBN: 0387946365 | ASIN: 0275969363 | 330 Pages | PDF | 8.31 MB

The Maghreb–Morocco, Algeria, Libya, and Tunisia–is a region overburdened by unnecessary military expenditures. Despite persistent civil conflicts and militarized regimes in a number of countries in the region, there are actually few genuine external threats, and the armed forces are now largely used to maintain internal security.

What Is Computer Science?: An Information Security Perspective (Repost)  eBooks & eLearning

Posted by roxul at Nov. 30, 2016
What Is Computer Science?: An Information Security Perspective (Repost)

Daniel Page, Nigel Smart, "What Is Computer Science?: An Information Security Perspective"
English | 2014-01-14 | ISBN: 3319040413 | PDF | 232 pages | 4 MB

Selecting Disinfectants in a Security-Conscious Environment  eBooks & eLearning

Posted by tanas.olesya at Nov. 30, 2016
Selecting Disinfectants in a Security-Conscious Environment

Selecting Disinfectants in a Security-Conscious Environment by American Water Works Association
English | July 2009 | ISBN: 1583217355 | 152 Pages | PDF | 5 MB

This guide describes a process to evaluate disinfection options that meets the needs of each system, regardless of size.

Security Spy 4.0.10  Software

Posted by Givaraa at Nov. 30, 2016
Security Spy 4.0.10

Security Spy 4.0.10 | MacOSX | 12 MB

SecuritySpy will enable you to quickly set up an effective video surveillance (CCTV) system. If you plan to install the base home or a large professional system, SecuritySpy provides a reliable solution. SecuritySpy is working with a wide range of cameras to suit every need, from traditional analog cameras to the latest high-definition network camera, offering superior quality video at a resolution of megapixels.

The Dollar and National Security: The Monetary Component of Hard Power  eBooks & eLearning

Posted by roxul at Nov. 29, 2016
The Dollar and National Security: The Monetary Component of Hard Power

Paul Viotti, "The Dollar and National Security: The Monetary Component of Hard Power"
English | ISBN: 0804791139, 0804792259 | 2014 | 248 pages | PDF, EPUB | 5 MB