# عنوان نوع فایل سایز فایل بازدید دانلود امتیاز قیمت (تومان)
1
Mastering Metasploit
15.61 MB 81 2
رایگان
2
Learning Pentesting for Android Devices
13.56 MB 82 1
رایگان
3
Learning Nessus for Penetration Testing
4.34 MB 80 1
رایگان
4
Kali Linux Network Scanning Cookbook
5.13 MB 83 1
رایگان
5
Hacking Point of Sale
23.11 MB 79 1
رایگان
6
Data-Driven Security
11.66 MB 109 0
رایگان
7
Cybersecurity for Executives
2.22 MB 79 1
رایگان
8
Cyber Threat!
1.30 MB 70 1
رایگان
9
Computer Security Handbook, 6th Edition
28.83 MB 89 1
رایگان
10
Building Virtual Pentesting Labs for Advanced Penetration Testing
25.17 MB 82 1
رایگان
11
Black Hat Python
5.72 MB 171 2
رایگان
12
Anti-Hacker Tool Kit, 4th Edition
27.06 MB 74 0
رایگان
13
Android Security Internals
6.76 MB 111 1
رایگان
14
Android Hacker’s Handbook
7.94 MB 87 1
رایگان
15
Advanced API Security
2.55 MB 86 1
رایگان
16
Network Attacks and Defenses: A Hands-on Approach
22.77 MB 83 1
رایگان
17
A Practical Guide to Networking and Security in iOS 8
4.16 MB 76 2
رایگان
18
Engineering Secure Software and Systems
5.72 MB 76 0
رایگان
19
Data Analysis For Network Cyber-Security
5.90 MB 78 1
رایگان
20
Official (ISC)2 Guide to the CISSP-ISSMP CBK, Second Edition
6.30 MB 69 2
رایگان
21
Cyberspace and Cybersecurity
2.51 MB 76 0
رایگان
22
Bitcoin for the Befuddled
24.56 MB 82 0
رایگان
23
Wireshark Network Analysis, 2nd Edition
25.38 MB 70 0
رایگان
24
Computer Forensics JumpStart, 2nd Edition
5.25 MB 77 0
رایگان
25
Transnational Security
3.42 MB 72 0
رایگان
Mastering Metasploit

Mastering Metasploit

The Metasploit framework has been around for a number of years and is one of the most widely used tools for carrying out penetration testing on variou ...

دانلود 2
15.61 MB
رایگان
Learning Pentesting for Android Devices

Learning Pentesting for Android ...

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are pu ...

دانلود 1
13.56 MB
رایگان
Learning Nessus for Penetration Testing

Learning Nessus for Penetration ...

IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most important and commonly performed secur ...

دانلود 1
4.34 MB
رایگان
Kali Linux Network Scanning Cookbook

Kali Linux Network Scanning Coo ...

Kali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of ne ...

دانلود 1
5.13 MB
رایگان
Hacking Point of Sale

Hacking Point of Sale

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too ...

دانلود 1
23.11 MB
رایگان
Data-Driven Security

Data-Driven Security

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...

11.66 MB
رایگان
Cybersecurity for Executives

Cybersecurity for Executives

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business. Emphasizes, i ...

دانلود 1
2.22 MB
رایگان
Cyber Threat!

Cyber Threat!

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of go ...

دانلود 1
1.30 MB
رایگان
Computer Security Handbook, 6th Edition

Computer Security Handbook, 6th ...

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real ...

دانلود 1
28.83 MB
رایگان
Building Virtual Pentesting Labs for Advanced Penetration Testing

Building Virtual Pentesting Lab ...

A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or net ...

دانلود 1
25.17 MB
رایگان
Black Hat Python

Black Hat Python

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the mag ...

دانلود 2
5.72 MB
رایگان
Anti-Hacker Tool Kit, 4th Edition

Anti-Hacker Tool Kit, 4th Editi ...

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network fr ...

27.06 MB
رایگان
Android Security Internals

Android Security Internals

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...

دانلود 1
6.76 MB
رایگان
Android Hacker’s Handbook

Android Hacker’s Handbook

As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by expe ...

دانلود 1
7.94 MB
رایگان
Advanced API Security

Advanced API Security

Advanced API Security is a complete reference to the next wave of challenges in enterprise security – securing public and private APIs. API adoption i ...

دانلود 1
2.55 MB
رایگان
Network Attacks and Defenses: A Hands-on Approach

Network Attacks and Defenses: A ...

The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attac ...

دانلود 1
22.77 MB
رایگان
A Practical Guide to Networking and Security in iOS 8

A Practical Guide to Networking ...

This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...

دانلود 2
4.16 MB
رایگان
Engineering Secure Software and Systems

Engineering Secure Software and ...

This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Mila ...

5.72 MB
رایگان
Data Analysis For Network Cyber-Security

Data Analysis For Network Cyber ...

There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...

دانلود 1
5.90 MB
رایگان
Official (ISC)2 Guide to the CISSP-ISSMP CBK, Second Edition

Official (ISC)2 Guide to the CI ...

The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP®) certification was develope ...

دانلود 2
6.30 MB
رایگان
Cyberspace and Cybersecurity

Cyberspace and Cybersecurity

English | ISBN: 1466501332 | 2012 | 236 pages | PDF | 2 MBBased on relate Based on related courses and research on the cyber environment in Europe, th ...

2.51 MB
رایگان
Bitcoin for the Befuddled

Bitcoin for the Befuddled

Unless you’ve been living under a rock for the last couple of years, you’ve probably heard of Bitcoin-the game-changing digital currency used by milli ...

24.56 MB
رایگان
Wireshark Network Analysis, 2nd Edition

Wireshark Network Analysis, 2nd ...

Wireshark is the world’s most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot ...

25.38 MB
رایگان
Computer Forensics JumpStart, 2nd Edition

Computer Forensics JumpStart, 2 ...

Essential reading for launching a career in computer forensicsInternet crime is on the rise, catapulting the need for computer forensics specialists. ...

5.25 MB
رایگان
Transnational Security

Transnational Security

Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...

3.42 MB
رایگان

بارگزاری