Old Search System: security cameras




  • Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

    Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography) 407 pages | English |...





  • Lynda - Oracle Database 12c: Security

    Lynda - Oracle Database 12c: Security Database security is one of the hottest topics for...


    Table of ContentsIntroduction1. Database Security Fundementals2. Advanced Database Security Concepts3. Download and Set Up the Course VM4. Users and Permissions5. Database Roles6. Auditing Access to Data7. Data EncryptionConclusion


  • Lynda - MongoDB: Security

    Lynda - MongoDB: Security Discover how to create secure deployments of MongoDB for production-ready environments. In...


    Table of ContentsIntroduction1. Authentication2. Authorization and Encryption3. Auditing and Best Practices


  • Intsec - Internet Security Powerpoint Template

    Intsec - Internet Security Powerpoint TemplatePPTX, PPT | 65 MB






  • Lynda - Programming Foundations: Web Security (2014)

    Lynda - Programming Foundations: Web Security (2014) Learn about the most important security concerns when...


    Table of ContentsIntroduction1. Security Overview2. General Security Principles3. Filtering Input, Controlling Output4. The Most Common Attacks5. Encryption and User Authentication6. Other Areas of ConcernConclusion


  • Web Security and Hacking for Beginners

    Web Security and Hacking for BeginnersVideo: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz,...


    What you\'ll learn
    Recognize common website vulnerabilities and hackers exploit these weaknesses
    Practice defensive coding for preventing attacks
    Evaluate app security
    Requirements
    Basic knowledge of Ruby on Rails
    Basic understanding of SQL
    The ability to read javascript code
    Fluency in English
    Come motivated and ready to learn!
    Description
    By the end of One...


  • Internet Security Concept Landing Page 3708757

    Internet Security Concept Landing Page 3708757Internet security illustration concept landing page for site. internet protection....






  • The Complete Security On Instagram

    The Complete Security On InstagramVideo: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch...


    What you\'ll learn
    How to Increase Instagram security page
    knowledege to Increase their page
    How to revert page when was hacked
    How report a page
    How conatact to Instagram
    How to make Gmail account and increase Gmail security
    How disable Instagram page
    How delete Instagram page permanently
    How to teminate...


  • ESET Internet Security 13.1.16.0 Multilingual

    ESET Internet Security 13.1.16.0 MultilingualESET Internet Security offers the ultimate defense of your PC against...


    ESET Internet Security keeps your computer or laptop safe with intelligent multi-layered protection. Because it combines proven antivirus, antispyware, firewall, anti-rootkit and antispam capabilities. ESET Internet Security 11 is built as a high-performing security solution against all internet threats. Also to secure your personal data and sensitive information whether online...


  • The Basics of Cyber Security 2020

    The Basics of Cyber Security 2020Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz,...


    What you\'ll learn
    Understand the main topics in cyber security
    Understand the common sources of cyber security events
    Protecting yourself from cyber security threats
    The highest cyber threats to institutions
    Data protection and privacy
    Basic knowledge of cyber risk management
    Introduction to Cryptography
    Understand business continuity planning and disaster recovery
    Requirements
    ...


  • Lynda - VMware vSphere 6.5 Security

    Lynda - VMware vSphere 6.5 Security Learn how to administer the critical security components of...


    Table of Contents1. vSphere Security


  • Lynda - VMware NSX: Security

    Lynda - VMware NSX: Security Making sure an organization's software-defined network (SDN) is secure is...


    Table of ContentsIntroduction1. Create an SDDC2. Microsegmentation of Security3. Edge Firewalls and the Distributed Firewall4. Role Based Access Control5. Service ComposerConclusion


  • AWS Administration: Security Fundamentals

    AWS Administration: Security Fundamentals https://www.lynda.com/Amazon-Web-Services-tutorials/AWS-Administration-Security-Fundamentals/2822140-2.html Proper understanding of security services is crucial for any cloud...


    Introduction 1. The AWS Account 2. Identity Security Conclusion


  • Lynda - SharePoint 2013 Security for Users

    Lynda - SharePoint 2013 Security for Users Balancing security and user satisfaction is hard. But...


    Table of ContentsIntroduction1. SharePoint Security Fundamentals2. SharePoint Users and Their Roles3. Accessing Content4. Restricting Access to Content5. Roles and Responsibilities6. Security for Publishing Sites7. Managing SharePoint Security Groups8. Search and SharePoint Security9. Planning WorksheetsConclusion


  • Spring: Spring Security

    Spring: Spring Security https://www.lynda.com/Web-tutorials/Spring-Spring-Security/704153-2.html Developers sometimes struggle to see their apps as attackers do. They...


    Introduction1. Spring Security Concepts2. Securing Web Applications with Spring3. LDAP Authentication4. Leveraging OAuth 2 with Spring Security5. WebFlux SecurityConclusion


  • AWS Administration: Security Operations

    AWS Administration: Security Operations https://www.lynda.com/Amazon-Web-Services-tutorials/AWS-Administration-Security-Operations/2824079-2.html Is your company making a move to the cloud with...


    Introduction 1. Infrastructure Security 2. Data Protection 3. Detective Controls Conclusion


  • Lynda - Web Security: Same-Origin Policies

    Lynda - Web Security: Same-Origin Policies In network communications, knowing where something came from can...


    Table of ContentsIntroduction1. Basics of Same-Origin Policies2. Securing Shared Data with CORS Restrictions3. Securing Sites with a Content Security Policy4. Securing Communication with Transport Security5. Communicating Securely across Browser Windows6. Securing CookiesConclusion


  • Lynda - Security Testing Essential Training

    Lynda - Security Testing Essential Training To provide your organization with confidence, you need to...


    Table of ContentsIntroduction1. Understanding Security Assessments2. Your Testing Environment3. Planning Your Assessment4. Review Techniques5. Identifying Your Targets6. Vulnerability Validation7. Additional ConsiderationsConclusion


  • Lynda - Security Tips Weekly

    Lynda - Security Tips Weekly Security isn't just a concern for the tech savvy among...


    Table of ContentsIntroduction1. Security Tips


  • Lynda - Security Testing: Nmap Security Scanning

    Lynda - Security Testing: Nmap Security Scanning Nmap is a powerful network discovery and security...


    Table of ContentsIntroduction1. Network Scanning2. Installing Nmap3. Scanning with Nmap4. Configuring Nmap Scans5. Fingerprinting Systems and Services6. Scan Output7. Case Studies in ScanningConclusion