Old Search System: security cameras




  • Network Security: Know It All

    Network Security: Know It All 368 pages | English | ISBN-10: 0123744636 | ISBN-13: 978-0123744630...





  • Building an Information Security Awareness Program

    Building an Information Security Awareness Program 272 pages | English | ISBN-10: 0849301165 | ISBN-13:...





  • Food Science and Security

    Food Science and Security 330 pages | English | ISBN-10: 1606929771 | ISBN-13: 978-1606929773 https://www.amazon.com/dp/1606929771




  • CCNA Security

    Coktum

    CCNA Security

    CCNA Security 535 pages | English | ISBN-10: 0789738007 | ISBN-13: 978-0789738004 https://www.amazon.com/dp/0789738007





  • Enhancing Computer Security with Smart Technology

    Enhancing Computer Security with Smart Technology 288 pages | English | ISBN-10: 0849330459 | ISBN-13:...





  • Microservices: Security

    Microservices: Security https://www.lynda.com/Java-tutorials/Microservices-Security/2841531-2.html Cyberattacks are on the riseā€”and your microservices may very well be underprotected....


    Introduction1. Microservice Security Foundations2. Identity Management and Access Control3. Token-Based Security and Standards4. Security between Microservices5. Application and Container SecurityConclusion


  • Security Testing Nmap Security

    Security Testing Nmap Security Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch...


    What you\'ll learn
    Security Testing Nmap Security
    Requirements
    No
    Description
    •This course is designed for students who are completely new to Nmap. You don\'t need any prior experience running network scans or performing cybersecurity assessments. We\'ll walk through everything you need to know.
    •Even how to install the Nmap scanner on your system. You...


  • Dictionary of Information Security

    Dictionary of Information Security 256 pages | English | ISBN-10: 1597491152 | ISBN-13: 978-1597491150 https://www.amazon.com/dp/1597491152





  • IBM WebSphere Application Server v7.0 Security

    IBM WebSphere Application Server v7.0 Security 312 pages | English | ISBN-10: 1849681481 | ISBN-13:...





  • Oreilly - Introduction to Hadoop Security

    Oreilly - Introduction to Hadoop Security by Jeff Bean | Released March 2016 | ISBN:...


    In this Introduction to Hadoop Security training course, expert author Jeff Bean will teach you how to use Hadoop to secure big data clusters. This course is designed for users that are already familiar with the basics of Hadoop.You will start by learning about tooling, then jump into learning about...


  • Moodle Security

    Moodle Security 204 pages | English | ISBN-10: 1849512647 | ISBN-13: 978-1849512640 https://www.amazon.com/dp/1849512647





  • CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA Security exam (210-260)

    CCNA Security 210-260 Certification Guide: Build your knowledge of network security and pass your CCNA...





  • Army Forces for Homeland Security

    Army Forces for Homeland Security 100 pages | English | ISBN-10: 0833036734 | ISBN-13: 978-0833036735...





  • Ultimate ServiceNow Security Operations Course

    Ultimate ServiceNow Security Operations Course Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz,...


    What you'll learn
    ServiceNow Security Operations
    ServiceNow Security Incident
    ServiceNow Vulnerability Response
    ServiceNow Threat intelligence
    ServiceNow Security Operations Integrations
    Requirements
    Any ServiceNow instance
    Description
    Welcome to the Ultimate ServiceNow Security Operations course! Within this course you will learn how to use and begin to configure Vulnerability Response, Security Incident Response, and Threat Intelligence...


  • Security Awareness For Everyone

    Security Awareness For Everyone (Last Updated: 11/2020) https://www.udemy.com/course/security-awareness-for-everyone/ Learn to protect yourself and others from...


    What you'll learn Learn to protect yourself and others at work and home from trouble brought on by the digital age and enhanced by a global pandemic. Requirements None whatsoever! Description Why This Matters Looking closely at the digital forensics of many breaches, the acquired evidence often points to a...


  • Cryptography in Cyber Security with Python

    Cryptography in Cyber Security with Python Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100...


    What you'll learn
    cryptography
    cyber security
    confidentiality
    quantum computing
    crypto in python
    Requirements
    basic math
    general computing
    Description
    You can find basics of cryptography and learn Cryptographic Toolset implemented in Python.
    Symmetric and asymmetric algorithms,;
    AES,
    Salsa20,
    RSA,
    DH,
    ECDH,
    ECDSA
    Hash Functions:
    SHA-1,
    SHA-2,
    SHA-3
    MD5
    Message Authentication Codes (MAC, HMAC, CMAC)
    You can find answers...


  • McAfee Endpoint Security 10.7.0.926.6 Multilingual

    McAfee Endpoint Security 10.7.0.926.6 Multilingual | 291.7 MbOur new endpoint protection suites emphasize integration, automation,...



    The volume and sophistication of endpoint threats has steadily grown as adversaries target these often mobile and remote assets as initial attack footholds. Adding to the challenge, security teams, after years of bolting endpoint security point products together, are now managing an average of ten different agents and five different...


  • IT Security Gumbo: Exploitation with Kali

    [center]IT Security Gumbo: Exploitation with Kali (Last Updated: 10/2019) https://www.udemy.com/course/it-security-gumbo-exploitation-with-kali/


    Hands On Penetration Testing with Kali Linux[/center] What you'll learn Perform remote exploitation of systems Escalate local privileges to root level Utilize a variety of industry standard penetration testing tools within the Kali Linux distro


  • Ethical Hacking and Network Security Applied

    Ethical Hacking and Network Security Applied (Last Updated: 8/2020) https://www.udemy.com/course/ethical-hacking-and-network-security-applied/ Ethical Hacking Skills to Get...


    What you\'ll learn Practical Ethical Hacking and Penetration Testing Skills Learn How to set up a Hacking Lab (Kali Linux, Metasploitable, VMs). You will MASTER Ethical Hacking and Network Security Key Concepts (Reconnaissance, Sniffing, Exploitation ...). Acquire the Skills to MITIGATE ALL THE ATTACKS presented in the course. Learn How...


  • Spring Security Core: Beginner to Guru

    Spring Security Core: Beginner to Guru Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100...


    What you'll learn
    How to Secure Applications using Spring Security
    How to Protect Against Common Web Security Vulnerabilities (OWASP)
    Use Spring Security to Authenticate Application Users
    Use Spring Security to Authorize User Actions
    Password Management
    Best Practices for Limiting User Access
    Use Test Driven Development to Test User Access
    Requirements
    Must...