Qualys Security

How to Comply with the PCI Data Security Standard  eBooks & eLearning

Posted by ragm at Feb. 1, 2009
How to Comply with the PCI Data Security Standard

How to Comply with the PCI Data Security Standard
Sumedh Thakar, Terry Ramos | ISBN: 0470744529 | 2009-01-17 | 68 pages |PDF | 1,2 MB

Complying with the PCI Data Security Standard may seem like a daunting task for merchants. This book is a quick guide to understanding how to protect cardholder data and comply with the requirements of PCI - from surveying the standard's requirements to detailing steps for verifying compliance.
Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology

Nicholas J. Daras, Themistocles M. Rassias, "Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology"
2017 | ISBN-10: 3319514989 | 422 pages | PDF | 7 MB
Application of Big Data for National Security: A Practitioner’s Guide to Emerging Technologies

Application of Big Data for National Security: A Practitioner’s Guide to Emerging Technologies
2015 | English | ISBN-10: 0128019670 | 316 pages | PDF | 10 Mb

iOS Application Security  eBooks & eLearning

Posted by IrGens at March 24, 2017
iOS Application Security

iOS Application Security
.MP4/.M4V, AVC, 1000 kbps, 1280x1024/676x540 | English, AAC, 240 kbps, 2 Ch | 7.8 hours | 5.07 GB
Instructor: Vivek Ramachandran

Security for Internet-Facing Servers  eBooks & eLearning

Posted by naag at March 24, 2017
Security for Internet-Facing Servers

Security for Internet-Facing Servers
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 264 MB
Genre: eLearning | Language: English

Virtual Pair Programmers - Spring Security: Module 2 - OAuth2 and REST  eBooks & eLearning

Posted by house23 at March 23, 2017
Virtual Pair Programmers - Spring Security: Module 2 - OAuth2 and REST

Virtual Pair Programmers - Spring Security: Module 2 - OAuth2 and REST
MP4 | AVC 287kbps | English | 1024x768 | 15fps | 6h 08mins | AAC stereo 94kbps | 1.03 GB
Genre: Video Training

This course follows on from our Spring Security Module. We use the CRM system built on the Webservices course, and we will convert this into an OAuth provider. A third party website will then become a client of this site. Part of our Spring Training series. You will need to understand the basic concepts of Spring Security, as covered in Module 1. We use REST extensively, although you only need a basic familiarity with it.

Virtual Pair Programmers - Spring Security: Module 1 - Core Concepts  eBooks & eLearning

Posted by ParRus at March 23, 2017
Virtual Pair Programmers - Spring Security: Module 1 - Core Concepts

Virtual Pair Programmers - Spring Security: Module 1 - Core Concepts
WEBRip | English | MP4 | 1024 x 768 | AVC ~326 kbps | 15 fps
AAC | 93.6 Kbps | 44.1 KHz | 2 channels | 06:32:09 | 1.03 GB
Genre: Video Tutorial

This course shows how to use Spring Security on a web application. Using Spring Security 4, we use the XML namespace to define authentication and authorisation roles. Common attacks and how to defend against them.

Graphical Models for Security (repost)  eBooks & eLearning

Posted by arundhati at March 23, 2017
Graphical Models for Security (repost)

Sjouke Mauw and Barbara Kordy, "Graphical Models for Security: Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015"
English | ISBN: 3319299670 | 2016 | 116 pages | PDF | 6 MB

European Security and Defence - March 2017  Magazines

Posted by Torries at March 22, 2017
European Security and Defence - March 2017

European Security and Defence - March 2017
English | 84 pages | True PDF | 9 MB

Security Task Manager 2.1i DC 22.03.2017 Multilingual  Software

Posted by melt_ at March 22, 2017
Security Task Manager 2.1i DC 22.03.2017 Multilingual

Security Task Manager 2.1i DC 22.03.2017 Multilingual | 2.9 Mb

Security Task Manager displays detailed information about all running processes (applications, DLLs, BHOs, and services). For each process, it improves on Windows Task Manager, providing a security risk rating, a process description, file path, CPU usage graph, start time, embedded hidden functions (for example keyboard monitoring, autostart entry, and browser supervision or manipulation), and process type, such as visible window, systray program, DLL, and IE plug-in. The security risk rating indicates the likelihood of the process being potential spyware, malware, a Trojan, or keylogger. It also deletes traces of your Internet and computer activity, prevents keyboard input monitoring, and warns you when the registry is changed.