بله | کانال کتابخانه سایبری
عکس پروفایل کتابخانه سایبریک

کتابخانه سایبری

۵۰عضو
thumbnail
#Acunetix 15.1 #docker
https://hub.docker.com/r/hypnguyen1209/acunetix

دانلود نرم افزار acunetix ورژن ۱۵.۱
https://ble.ir/cyberseclib

۱۸:۱۴

Data Engineering with Python [2020] Crickard Paul .pdf

۱۰.۵۱ مگابایت

Data Engineering with Python
Work with massive datasets to design data models and automate data pipelines using Python
Author:Crickard
https://ble.ir/cyberseclib

۱۸:۱۷

APT28_Understanding_a_group_specialized_in_attacks.pdf

۸۹۸.۴۵ کیلوبایت

APT28: Understanding a group specializing in attacks against intelligence sectors
Author:joas antonio
https://ble.ir/cyberseclib

۱۸:۱۹

The Ultimate Kali Linux Book - Second Edition.pdf

۴۹.۳۴ مگابایت

The Ultimate Kali Linux Book Second Edition
Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
Author:Glen D. Singh
https://ble.ir/cyberseclib

۱۸:۲۱

CSA-APT5-CITRIXADC-V1.PDF

۳۷۵.۲۴ کیلوبایت

NSA APT5: Citrix ADC Threat Hunting Guidance

#nsa #apt #citrix
https://ble.ir/cyberseclib

۱۸:۳۰

Industrializing.Financial.Services.with.DevOps.pdf

۲۱.۹۶ مگابایت

Industrializing Financial Services with DevOps
Proven 360° DevOps operating model practices for enabling a multi-speed bank
Author:Spyridon Maniotis
#Financial_Services #DevOps #operating_model_practices

https://ble.ir/cyberseclib

۱۸:۳۲

Intelligent Mobile Malware Detection.pdf

۵.۸۵ مگابایت

Intelligent Mobile Malware Detection
Security, Privacy, and Trust in Mobile Communications
Author:Tony Thomas, Roopak Surendran and Teenu S. John
#Intelligent_Mobile #Malware_Detection#Security #Privacy #Trust_in_Mobile_Communications
https://ble.ir/cyberseclib

۱۸:۳۶

Packt.Cybersecurity.and.Privacy.Law.Handbook.pdf

۸.۶۴ مگابایت

Cybersecurity and Privacy Law Handbook
A beginner’s guide to dealing with privacy and security while keeping hackers at bay
Author: Walter Rocchi
#Cybersecurity #Privacy_Law #hackers
https://ble.ir/cyberseclib

۱۸:۴۱

cta-2022-1213.pdf

۲.۴۳ مگابایت

CYBER THREAT ANALYSIS
CHINA Restrictive Laws Push Chinese Cybercrime toward Novel Monetization Techniques

#China #CYBER_THREAT_ANALYSIS#Restrictive_Laws #Cybercrime #Chinese_Cybercrime

https://ble.ir/cyberseclib

۱۸:۴۵

0139_CSD_YIR22_FINAL_LOWSIDE_ACCESSIBLE_FINAL_V2.PDF

۶.۴۴ مگابایت

NSA CYBERSECURITY 2022Year in review
#nsa #cybersecurity #report
https://ble.ir/cyberseclib

۲۰:۳۸

cta-2022-1215.pdf

۱.۵۵ مگابایت

CYBER THREAT ANALYSISRECORDED FUTURE
2022 Adversary Infrastructure ReportBy Insikt Groupundefined
#Infrastructure #CYBER_THREAT #THREAT_ANALYSIS #
https://ble.ir/cyberseclib

۲۰:۴۹

FSI_Intelligence_Report_Masscan_Ransomware_Threat_Analysis_ReportEnglish.pdf

۴۰.۷۴ مگابایت

Operation MaRS Masscan Ransomware
2022 Cyber Report
#Cyber_Threat #Threat_Intelligence#Operation_MaRS #MaRS #Ransomware #Threat_Analysis_Report
https://ble.ir/cyberseclib

۲۰:۵۳

221216.pdf

۷۰۷.۴۴ کیلوبایت

Criminal Actors Use Business Email Compromise to Steal Large Shipments of Food Products and Ingredients
Joint Cybersecurity advisory
December 15, 2022
#Cybersecurity #Food_Products
https://ble.ir/cyberseclib

۲۰:۵۸

cta-2022-1205.pdf

۱.۲۹ مگابایت

Exposing TAG53’s Credential Harvesting Infrastructure Used for Russia-Aligned Espionage Operations
CYBER THREAT ANALYSISRECORDED FUTURE

#Infrastructure #CYBER_THREAT #THREAT_ANALYSIS #Espionage #TAG53’s #Russia #Espionage_Operations
https://ble.ir/cyberseclib

۲۱:۰۲

Enisa_AAR_2022.pdf

۱.۵۸ مگابایت

CYBER EUROPE 2022: AFTER ACTION REPORT
Findings from a PAN-EUROPEAN cyber crisis Exercise
DECEMBER 2022
EUROPEAN UNION AGENCY FOR CYBERSECURITY
#cyber #crisis_Exercise #CYBERSECURITY
https://ble.ir/cyberseclib

۲۱:۰۵

POTENTIAL THREATS TO 5G NETWORK SLICING_508C_FINAL.PDF

۵۴۸.۱۸ کیلوبایت

Potential Threats to 5G Network Slicing

#nsa #cisa #5G #5G_Network_Slicing #Potential_Threats

https://ble.ir/cyberseclib

۲۱:۱۰

2022_Encrypt,_Sign,_Attack_A_Compact_Introduction_to_Cryptography.pdf

۵.۹۴ مگابایت

Encrypt, Sign, Attack A compactintroduction to cryptography
Author: Olaf ManzMathematics Study Resources
Springer publisher
#Encrypt #Sign #Attack #cryptography#security
https://ble.ir/cyberseclib

۲۱:۱۶

Conceptual Guide to Enterprise Cyber Security 2023.pdf

۱.۳۵ مگابایت

A conceptual Guide to: Enterprise Information Security 2023
Author : Tommy Babel
www.cyzea.io , CoFounder & CEO
#Information_Security #Enterprise_Information #cyber
https://ble.ir/cyberseclib

۳:۴۰