Details for:

Type:
Files:
Size:

Uploaded On:
Added By:
Not Trusted

Seeders:
Leechers:
Info Hash:
1AB6318EB01F2244EA22C97C41204E01AF987B97
  1. The Complete Cyber Security Course - Nathan House.zip 3.1 GB
  2. Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges: Threats and Counter Efforts.pdf 8.9 MB
  3. Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies.pdf 2.0 MB
  4. Cyber Crime Investigations: Bridging the Gaps Between Security Professional, Law Enforcement, and Prosecutors.pdf 9.2 MB
  5. Cyber Ransom Survival Guide: The Growing Threat of Ransomware and RDoS - and What to Do About It.pdf 2.2 MB
  6. Cyber Crime: Technology Turns Into a Curse.pdf 243.8 KB
  7. International Conference on Applications and Techniques in Cyber Security and Intelligence.pdf 42.4 MB
  8. Cybersecurity Law (2017).pdf 2.9 MB
  9. Insider Threats in Cyber Security.pdf 2.6 MB
  10. Online Health and Safety: From Cyberbullying to Internet Addiction.pdf 2.5 MB
  11. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats.pdf 5.3 MB
  12. Cyber Warfare: Building the Scientific Foundation.pdf 6.5 MB
  13. The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice.pdf 3.0 MB
  14. Cyber-Physical Systems.pdf 8.6 MB
  15. Malicious Bots An Inside Look into the Cyber-Criminal Underground of the Internet.pdf 4.3 MB
  16. Darkweb Cyber Threat Intelligence Mining.pdf 6.2 MB
  17. Cyber Denial, Deception and Counter Deception: A Framework for Supporting Active Cyber Defense.pdf 4.2 MB
  18. Cybercrime and Espionage: An Analysis of Subversice Multi-vector Threats.pdf 14.3 MB
  19. Strategic Cyber Deterrence: The Active Cyber Defense Option.pdf 3.1 MB
  20. How to Define and Build an Effective Cyber Threat Intelligence Capability.pdf 3.3 MB
  21. Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar.pdf 812.3 KB
  22. Cyber Guerilla.pdf 1.8 MB
  23. Cyber Infrastructure Protection.pdf 4.0 MB
  24. Understanding Secure Sockets Layer.zip 323.4 MB
  25. Responses to Cyber Terrorism.pdf 2.3 MB
  26. The Global Cyber-Vulnerability Report.pdf 13.5 MB
  27. Foundations for Innovation Strategic R&D Opportunities for 21st Century Cyber-Physical Systems.pdf 1.8 MB
  28. Cybercrime: A Reference Handbook - Contemporary World Issues.pdf 910.4 KB
  29. Crypto Anarchy, Cyberstates, and Pirate Utopias.pdf 3.7 MB
  30. Cyber Spying: Tracking Your Family's (Sometimes) Secret Online LIves.pdf 69.3 MB
  31. The Second Economy: The Race for Trust, Treasure and Time in the Cybersecurity War.pdf 5.4 MB
  32. Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations.pdf 21.1 MB
  33. Cyber Physical Systems: Architectures, Protocols, and Applications.pdf 48.9 MB
  34. Evolution of Cyber Technologies and Operations to 2035.pdf 2.9 MB
  35. Inside Cyber Warfare: Mapping the Cyber Underworld 2nd Edition.pdf 13.7 MB
  36. FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security.pdf 9.8 MB
  37. Scene of the Cybercrime 2nd Edition.pdf 7.7 MB
  38. The Complete Nmap Ethical Hacking Course for Network Security - Nathan House.zip 690.5 MB
  39. Cybersecurity for Hospitals and Healthcare Facilities: A Guide to Detection and Prevention.pdf 8.1 MB
  40. Cyber Security and Privacy 2015.pdf 6.7 MB
  41. Global Cyber Security: Thinking About The Niche for NATO.pdf 128.7 KB
  42. Enhancing the Role of Insurance in Cyber Risk Management.pdf 2.6 MB
  43. Spam Nation: The Inside Story of Organized Cybercrime-From Global Epidemic to Your Front Door.pdf 6.4 MB
  44. Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard.pdf 1.5 MB
  45. Cyber Warfare: A Reference Handbook - Contemporary World Issues.pdf 2.9 MB
  46. Cyber Security: A practitioner's guide.pdf 9.1 MB
  47. Cyber Security Cryptography and Machine Learning 2017.pdf 15.7 MB
  48. Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats.pdf 21.3 MB
  49. Operations Research, Engineering, and Cyber Security: Trends in Applied Mathematics and Technology.pdf 7.0 MB
  50. Information Security Theory and Practice: Security of Mobile and Cyber-Physical Systems 2013.pdf 2.4 MB
  51. Cyber Security Essentials.pdf 8.8 MB
  52. Cyber Crime and Cyber Terrorism Investigator's Handbook.pdf 6.2 MB
  53. Cyber Spying Tracking Your Familys Secret Online Lives (2005).pdf 105.9 MB
  54. Cyber Situational Awareness: Issues and Research.pdf 10.2 MB
  55. The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy.pdf 6.0 MB
  56. Cyber Law and Cyber Security in Developing and Emerging Economies.pdf 1.9 MB
  57. Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions Advances in-Information Security and Privacy.pdf 7.0 MB
  58. Cyber Security by Kohn G. Voeller.pdf 1.4 MB
  59. Cyber Dragon: Inside China’s Information Warfare and Cyber Operations.pdf 2.5 MB
  60. Cyber Security: Deterrence and IT Protection for Critical Infrastructures.pdf 1.5 MB
  61. Mathematics Of Autonomy: Mathematical Methods for Cyber-Physical-Cognitive Systems.pdf 17.7 MB
  62. Cyber Adversary Characterization: Auditing the Hacker Mind.pdf 3.2 MB
  63. Security of Industrial Control Systems and Cyber-Physical Systems 2016.pdf 4.5 MB
  64. Cyber Conflict and Global Politics.pdf 981.7 KB
  65. Computer Network Security and Cyber Ethics 4th Edition.pdf 2.4 MB
  66. Cyber Security for Industrial Control Systems: from the viewpoint of close-loop.pdf 3.7 MB
  67. Cyber Defense and Situational Awareness.pdf 8.5 MB
  68. The Law of Cybercrimes and Their Investigations.pdf 27.0 MB
  69. Policing Cyber Crime.pdf 3.5 MB
  70. Cyber-War: The Anatomy of the Global Security Threat.pdf 1.6 MB
  71. Introduction to Cyber-Warfare.pdf 9.3 MB
  72. Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground.pdf 1.3 MB
  73. Cybersecurity Lexicon.pdf 1.3 MB
  74. Cyber-Physical Security: Protecting Critical Infrastructure at the State and Local Level.pdf 4.3 MB
  75. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners 2nd Edition.pdf 8.6 MB
  76. Security-Aware Design for Cyber-Physical Systems: A Platform-Based Approach.pdf 6.3 MB
  77. Strategic Cyber Defense: A Multidisciplinary Perspective.pdf 4.4 MB
  78. Cyber-Security of SCADA and Other Industrial Control Systems.pdf 9.3 MB
  79. Trustworthy Cyber-Physical Systems Engineering.pdf 9.6 MB
  80. Cyber Security CSS 2015.pdf 4.1 MB
  81. Digital Defense: A Cybersecurity Primer.pdf 6.7 MB
  82. Cyber Warfare: A Multidisciplinary Analysis.pdf 1.4 MB