Subcategories

Racial Profiling and the NYPD: The Who, What, When, and Why of Stop and Frisk [Repost]

Posted By: tanas.olesya
Racial Profiling and the NYPD: The Who, What, When, and Why of Stop and Frisk [Repost]

Racial Profiling and the NYPD: The Who, What, When, and Why of Stop and Frisk by Jay L. Newberry
English | 1 July 2017 | ISBN: 3319580906 | 84 Pages | PDF | 1.55 MB

Global Responses to Domestic Violence [Repost]

Posted By: tanas.olesya
Global Responses to Domestic Violence [Repost]

Global Responses to Domestic Violence by Eve S. Buzawa
English | 4 July 2017 | ISBN: 3319567195 | 318 Pages | PDF | 3.61 MB

Applications and Techniques in Information Security [Repost]

Posted By: tanas.olesya
Applications and Techniques in Information Security  [Repost]

Applications and Techniques in Information Security (Communications in Computer and Information Science) by Wenjia Niu
English | 12 Nov. 2015 | ISBN: 3662486822 | 403 Pages | PDF | 53.59 MB

Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense

Posted By: sasha82
Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense

Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense by Elias G. Carayannis, David F. J. Campbell, Marios Panagiotis Efthymiopoulos
2018 | ISBN: 3319090682 | English | 1089 pages | PDF | 21 MB

(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests

Posted By: ksveta6
(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests

(ISC)2 SSCP Systems Security Certified Practitioner Official Practice Tests by Mike Chapple, David Seidl
2019 | ISBN: 1119543053 | English | 304 pages | EPUB | 3 MB

Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide

Posted By: AlenMiler
Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide

Cisco ASA for Accidental Administrators: An Illustrated Step-by-Step ASA Learning and Configuration Guide by Don R. Crawley
English | March 9, 2015 | ASIN: B00UGNVS3Y | 258 pages | AZW3 | 15 MB

Password Recovery

Posted By: AlenMiler
Password Recovery

Password Recovery: Unlocking Computer For Windows 8, Windows 7, Windows Vista, Windows XP, Unlock ZIP & RAR Unlock Password In 30 Minutes! by Stephan Jones
English | December 11, 2014 | ASIN: B00QXHUQ80 | 31 pages | MOBI | 2.50 MB

Introduction to Cryptanalysis

Posted By: hill0
Introduction to Cryptanalysis

Introduction to Cryptanalysis
by Zacharias Voulgaris PhD

English | 2019 | MP4 | Video: 720 | Subtitles: no | Duration: 27m | 43 MB

Solving Cyber Risk: Protecting Your Company and Society

Posted By: First1
Solving Cyber Risk: Protecting Your Company and Society

Solving Cyber Risk: Protecting Your Company and Society by Andrew Coburn, Eireann Leverett, Gordon Woo
English | December 25th, 2018 | ISBN: 1119490936 | 384 pages | EPUB | 2.89 MB

The non-technical handbook for cyber security in the insurance industry

Quandaries of the Small-District Superintendency [Repost]

Posted By: tanas.olesya
Quandaries of the Small-District Superintendency [Repost]

Quandaries of the Small-District Superintendency by Gary Ivory
English | 1 Jan. 2015 | ISBN: 1137370149 | 210 Pages | PDF | 1.49 MB

Informations- und Kodierungstheorie, Auflage: 4 (repost)

Posted By: interes
Informations- und Kodierungstheorie, Auflage: 4 (repost)

Informations- und Kodierungstheorie, Auflage: 4 by Dagmar Schönfeld, Herbert Klimant and Rudi Piotraschke
Deutsch | ISBN: 3834806471 | 2012 | 304 pages | PDF | 4 MB

Das IT-Gesetz: Compliance in der IT-Sicherheit: Leitfaden für ein Regelwerk zur IT-Sicherheit im Unternehmen (repost)

Posted By: interes
Das IT-Gesetz: Compliance in der IT-Sicherheit: Leitfaden für ein Regelwerk zur IT-Sicherheit im Unternehmen (repost)

Das IT-Gesetz: Compliance in der IT-Sicherheit: Leitfaden für ein Regelwerk zur IT-Sicherheit im Unternehmen, Auflage: 2 by Ralf-T. Grünendahl, Andreas F. Steinbacher and Peter H.L. Will
Deutsch | ISBN: 3834816809 | 2012 | 393 pages | PDF | 3,8 MB

Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce (repost)

Posted By: interes
Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce (repost)

Daten- und Identitätsschutz in Cloud Computing, E-Government und E-Commerce by Georg Borges and Jörg Schwenk
Deutsch | ISBN: 3642301010 | 2013 | 200 pages | PDF | 2,6 MB

Datenschutz bei Wearable Computing: Eine juristische Analyse am Beispiel von Schutzanzügen (repost)

Posted By: interes
Datenschutz bei Wearable Computing: Eine juristische Analyse am Beispiel von Schutzanzügen (repost)

Datenschutz bei Wearable Computing: Eine juristische Analyse am Beispiel von Schutzanzügen by Alexander Roßnagel, Silke Jandt, Hendrik Skistims and Julia Zirfas
Deutsch | ISBN: 3834825549 | 2012 | 188 pages | PDF | 2,4 MB

Summary: Making the Cisco Connection: Review and Analysis of Bunnell's Book

Posted By: AlenMiler
Summary: Making the Cisco Connection: Review and Analysis of Bunnell's Book

Summary: Making the Cisco Connection: Review and Analysis of Bunnell's Book by BusinessNews Publishing
English | September 29, 2014 | ASIN: B00O2X3Q0W | 48 pages | AZW3 | 0.31 MB