The NSA Report Liberty and Security in a Changing World


The NSA Report Liberty and Security in a Changing World

Richard A. Clarke, Michael J. Morell, "The NSA Report: Liberty and Security in a Changing World"
English | 2014 | ISBN: 0691163200 | EPUB | pages: 288 | 2.4 mb

Download Now

Quick Bite Of Ethical Hacking And Cyber Security

Quick Bite Of Ethical Hacking And Cyber Security

Quick Bite Of Ethical Hacking And Cyber Security
.MP4 | Video: 1280x720, 30 fps(r) | Audio: AAC, 48000 Hz, 2ch | 760 MB
Duration: 1.5 hours | Genre: eLearning Video | Language: English

Learn Hacking With Very Basics And Cyber Cracking

Download Now

Private Military and Security Companies Chances, Problems, Pitfalls and Prospects


Private Military and Security Companies Chances, Problems, Pitfalls and Prospects

Private Military and Security Companies: Chances, Problems, Pitfalls and Prospects By Dr. phil. Carlos Ortiz (auth.), Thomas Jäger, Gerhard Kümmel (eds.)
2007 | 494 Pages | ISBN: 3531149016 | PDF | 54 MB

Download Now

CISSP - Certified Information Systems Security Professional

CISSP - Certified Information Systems Security Professional
CISSP - Certified Information Systems Security Professional
English | Size: 2.19 GB
Category: CBTs


Download Now

McAfee Endpoint Security 10.6.1.190212 Multilingual

McAfee Endpoint Security 10.6.1.190212 Multilingual

McAfee Endpoint Security 10.6.1.190212 Multilingual | Languages: Multilingual | File Size: 300.37 MB


Our new endpoint protection suites emphasize integration, automation, and orchestration as the foundation of the threat defense lifecycle. Harnessing the power of machine learning to detect zero-day threats in near real time, our suites streamline the ability to quickly expose and remediate advanced attacks so productivity isn't compromised. The volume and sophistication of endpoint threats has steadily grown as adversaries target these often mobile and remote assets as initial attack footholds. Adding to the challenge, security teams, after years of bolting endpoint security point products together, are now managing an average of ten different agents and five different consoles with little to no integration or automation.

Download Now

Testing Security Controls and Detecting Vulnerabilities with Nmap

Testing Security Controls and Detecting Vulnerabilities with Nmap

Testing Security Controls and Detecting Vulnerabilities with Nmap
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 166 MB
Genre: eLearning | Language: English

Download Now

Master in Burp Suite Bug Bounty Web Security and Hacking

Master in Burp Suite Bug Bounty Web Security and Hacking
Master in Burp Suite Bug Bounty Web Security and Hacking
.MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + .VTT | Duration: 1.5 hours | Size: 748 MB


Download Now

NIST 800-171 System Security Plan (SSP) Template & Workbook


NIST 800-171 System Security Plan (SSP) Template & Workbook

NIST 800-171: System Security Plan (SSP) Template & Workbook by Mark A Russo CISSP-ISSAP CEH
English | January 22, 2019 | ASIN: B07M6BX436 | 133 pages | AZW3 | 1.48 MB

Download Now

NIST 800-160 A Roadmap for 21st Century Systems Security Engineering Success


NIST 800-160 A Roadmap for 21st Century Systems Security Engineering Success

NIST 800-160: A Roadmap for 21st Century Systems Security Engineering Success by Mark A Russo CISSP-ISSAP ITIL v3
English | December 14, 2018 | ASIN: B07KFSHGP6 | 172 pages | AZW3 | 2.46 MB

Download Now

Maximum Mac OS X Security


Maximum Mac OS X Security

Maximum (Mac OSX) Security By John Ray, William C. Ray
2003 | 768 Pages | ISBN: 0672323818 | EPUB | 4 MB

Download Now

Sitemap