Subcategories

CompTIA Security+ Certification Practice Exams (Exam SY0-501), 3rd Edition

Posted By: First1
CompTIA Security+ Certification Practice Exams (Exam SY0-501), 3rd Edition

CompTIA Security+ Certification Practice Exams (Exam SY0-501), 3rd Edition by Daniel Lachance, Glen E. Clarke
English | August 18th, 2017 | ISBN: 1260026906 | 385 Pages | EPUB | 7.99 MB

This fully updated, exam-focused study aid covers everything you need to know and shows you how to prepare for the CompTIA Security+ exam

Hacking Vim 7.2

Posted By: First1
Hacking Vim 7.2

Hacking Vim 7.2 by Kim Schulz
English | April 29th, 2010 | ISBN: 1849510504 | 246 Pages | EPUB | 0.71 MB

This book is a tutorial packed with ready-to-use hacks that give solutions for common problems faced by Vim users in their everyday life. Every chapter covers a set of recipes, each of which follows a systematic approach with a self-contained description of the task it covers, how to use it, and what you gain by using it. The minimum version of Vim required for each hack is clearly indicated. If you are a Vim user who wants to get more out of this legendary text editor, this book is for you. It focuses on making life easier for intermediate to experienced Vim users.

Information and Communication Technology for Development for Africa

Posted By: AvaxGenius
Information and Communication Technology for Development for Africa

Information and Communication Technology for Development for Africa: First International Conference, ICT4DA 2017, Bahir Dar, Ethiopia, September 25–27, 2017, Proceedings by Fisseha Mekuria
English | PDF | 2018 | 366 Pages | ISBN : 3319951521 | 28.64 MB

This book constitutes the proceedings of the First International Conference on Information and Communication Technology for Development for Africa, ICT4DA 2017, held in Bahir Dar, Ethiopia, in September 2017.

Decision and Game Theory for Security

Posted By: step778
Decision and Game Theory for Security

Arman (MHR) Khouzani, Emmanouil Panaousis, George Theodorakopoulos, "Decision and Game Theory for Security"
2015 | pages: 379 | ISBN: 3319255932 | PDF | 14,7 mb

Counterfeiting and Piracy: A Comprehensive Literature Review (Repost)

Posted By: step778
Counterfeiting and Piracy: A Comprehensive Literature Review (Repost)

Ludovica Cesareo, "Counterfeiting and Piracy: A Comprehensive Literature Review"
2015 | pages: 74 | ISBN: 3319253565 | PDF | 2,6 mb

ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference

Posted By: step778
ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference

Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider, "ISSE 2015: Highlights of the Information Security Solutions Europe 2015 Conference"
2015 | pages: 315 | ISBN: 3658109335 | PDF | 8,9 mb

CISCO SECFND Practice Questions: CCNA Cisco Cyber Security

Posted By: AlenMiler
CISCO SECFND Practice Questions: CCNA Cisco Cyber Security

CISCO SECFND Practice Questions: CCNA Cisco Cyber Security by John Nash
English | 2 Jul. 2018 | ASIN: B07F73LK85 | 87 Pages | MOBI | 256.2 KB

Federica De Stefani - Le regole della privacy. Guida pratica al nuovo GDPR

Posted By: Karabas91
Federica De Stefani - Le regole della privacy. Guida pratica al nuovo GDPR

Federica De Stefani - Le regole della privacy. Guida pratica al nuovo GDPR
Italian | 2018 | 168 pages | ISBN: 8820385287 | EPUB | 0,7 MB

Il volume nasce con l'intento di fornire una guida pratica che orienti l'utente nella complessa fase di adeguamento al nuovo regolamento legato alla normativa in materia di privacy, che ha subito un profondo cambiamento a seguito dell'emanazione del GDPR (General Data Protection Regulation) che diventerà esecutivo il 25 maggio 2018. Attraverso la spiegazione dei principi e delle norme regolatrici, si delineano percorsi che hanno come obiettivo nale quello di offrire strumenti pratici per conformare la propria attività alla nuova normativa. Attraverso 10 punti essenziali si analizzano i principi cardine del GDPR e le modalità pratiche per la tutela dei dati trattati.

Security Strategies of Middle Powers in the Asia Pacific

Posted By: First1
Security Strategies of Middle Powers in the Asia Pacific

Security Strategies of Middle Powers in the Asia Pacific by Ralf Emmers
English | February 5th, 2018 | ISBN: 0522871186 | 277 Pages | EPUB | 1.37 MB

Security Strategies of Middle Powers in the Asia Pacific examines what drives the different regional security strategies of four middle powers in the Asia Pacific: Australia, Indonesia, South Korea and Malaysia. Drawing on the extant middle power literature, the authors argue that the regional security strategies of middle powers could take two forms, namely, functional or normative.

National Technology and Industrial Base Integration : How to Overcome Barriers and Capitalize on Cooperation

Posted By: readerXXI
National Technology and Industrial Base Integration : How to Overcome Barriers and Capitalize on Cooperation

National Technology and Industrial Base Integration :
How to Overcome Barriers and Capitalize on Cooperation

by Rhys McCormick and Samantha Cohen
English | 2018 | ISBN: 1442280697 | 68 Pages | PDF | 0.87 MB

Udemy: The Complete Deep Web Course 2018

Posted By: igor_lv
Udemy: The Complete Deep Web Course 2018

Udemy: The Complete Deep Web Course 2018 by Alexis Ahmed
MP4 | Video: 1280x720 | 240 kbps | 48 KHz | Duration: 4 Hours | 680 MB
Genre: eLearning | Language: English | Skill level: All Levels

Information Security Management Systems

Posted By: AlenMiler
Information Security Management Systems

Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard by Heru Susanto
English | 19 Jun. 2018 | ISBN: 1771885777 | 326 Pages | PDF | 7.95 MB

Data Quality and Record Linkage Techniques

Posted By: AvaxGenius
Data Quality and Record Linkage Techniques

Data Quality and Record Linkage Techniques by Thomas N. Herzog
English | PDF | 2007 | 225 Pages | ISBN : 0387695028 | 1.82 MB

This book helps practitioners gain a deeper understanding, at an applied level, of the issues involved in improving data quality through editing, imputation, and record linkage. The first part of the book deals with methods and models. Here, we focus on the Fellegi-Holt edit-imputation model, the Little-Rubin multiple-imputation scheme, and the Fellegi-Sunter record linkage model. Brief examples are included to show how these techniques work.

Information Security and Privacy

Posted By: AvaxGenius
Information Security and Privacy

Information Security and Privacy: 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings by Willy Susilo
English | PDF | 2018 | 836 Pages | ISBN : 3319936379 | 23.01 MB

This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.

Ethical Hacking for Mobile Phones, Facebook & Social Media

Posted By: naag
Ethical Hacking for Mobile Phones, Facebook & Social Media

Ethical Hacking for Mobile Phones, Facebook & Social Media
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | Lec: 12 | 302 MB
Genre: eLearning | Language: English
SitemapStar Ocean EX | 712,770 CD | Real Life