Introduction to Transportation Security

Introduction to Transportation Security  eBooks & eLearning

Posted by interes at May 1, 2015
Introduction to Transportation Security

Introduction to Transportation Security by Frances L. Edwards and Daniel C. Goodrich
English | 2012 | ISBN: 143984576X | 388 pages | PDF | 4,3 MB
Introduction to Transportation Analysis, Modeling and Simulation: Computational Foundations and Multimodal Applications (Repost

Introduction to Transportation Analysis, Modeling and Simulation: Computational Foundations and Multimodal Applications By Dietmar P.F. Möller, Bernard Schroer
2014 | 343 Pages | ISBN: 1447156366 | PDF | 7 MB

Introduction to Network Security  eBooks & eLearning

Posted by naag at Sept. 25, 2017
Introduction to Network Security

Introduction to Network Security
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 27M | 68 MB
Genre: eLearning | Language: English

Introduction to Computer Security (1st Edition) (New International Edition)  eBooks & eLearning

Posted by Rare-1 at Aug. 16, 2017
Introduction to Computer Security (1st Edition) (New International Edition)

Roberto Tamassia, Michael T. Goodrich, " Introduction to Computer Security (1st Edition) (New International Edition)"
ISBN: 1292025409 | 2014 | PDF | 518 pages | 37.93 MB

From CIA to APT: An Introduction to Cyber Security  eBooks & eLearning

Posted by naag at Aug. 12, 2017
From CIA to APT: An Introduction to Cyber Security

From CIA to APT: An Introduction to Cyber Security
English | 2017 | ASIN: B074Q5H6Z2 | 133 pages | AZW3 | 2.10 Mb

Introduction to Hardware Security and Trust [Repost]  eBooks & eLearning

Posted by hill0 at March 8, 2017
Introduction to Hardware Security and Trust [Repost]

Introduction to Hardware Security and Trust by Mohammad Tehranipoor
English | 21 Sept. 2011 | ISBN: 1441980792 | 436 Pages | PDF | 5.18 MB

This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS,

Introduction to Hardware Security and Trust (Repost)  eBooks & eLearning

Posted by roxul at Feb. 13, 2017
Introduction to Hardware Security and Trust (Repost)

Mohammad Tehranipoor, Cliff Wang, "Introduction to Hardware Security and Trust"
English | 2012 | 435 Pages | ISBN: 1441980792 | PDF | 8 MB

Introduction to Private Security [Repost]  eBooks & eLearning

Posted by tanas.olesya at Dec. 23, 2016
Introduction to Private Security [Repost]

Introduction to Private Security by DEMPSEY
English | 22 Apr. 2010 | ISBN: 0495809853 | 480 Pages | PDF | 4 MB

PRIVATE SECURITY focuses on practical, real-world concepts and applications and includes detailed coverage of everything from industry background and related law to premise, retail, business, employment, and information/computer security as well as investigation, surveillance, and even homeland security.

Introduction to Hadoop Security  eBooks & eLearning

Posted by FenixN at Dec. 7, 2016
Introduction to Hadoop Security

Introduction to Hadoop Security
HDRips | MP4/AVC, ~893 kb/s | 1280x720 | Duration: 05:26:03 | English: AAC, 128 kb/s (2 ch) | 1.79 GB
Genre: Development / Programming / Security

In this Introduction to Hadoop Security training course, expert author Jeff Bean will teach you how to use Hadoop to secure big data clusters. This course is designed for users that are already familiar with the basics of Hadoop.

Introduction to Information Security  eBooks & eLearning

Posted by FenixN at April 27, 2016
Introduction to Information Security

Introduction to Information Security
HDRips | MP4/AVC, ~1493 kb/s | 1280x720 | Duration: ~8 hours | English: AAC, 128 kb/s (2 ch) | 6,09 GB
Genre: Development / Programming / Security

Introduction to Information Security LiveLessons provides technical professionals with a relatively brief, high-level overview of information security concepts, including the fundamental steps needed to secure a system, the types of threats and vulnerabilities they may encounter, and what steps can and should be taken to mitigate those threats and vulnerabilities.