https://hub.docker.com/r/hypnguyen1209/acunetix
دانلود نرم افزار acunetix ورژن ۱۵.۱
https://ble.ir/cyberseclib
۱۸:۱۴
Data Engineering with Python [2020] Crickard Paul .pdf
۱۰.۵۱ مگابایت
Work with massive datasets to design data models and automate data pipelines using Python
Author:Crickard
https://ble.ir/cyberseclib
۱۸:۱۷
APT28_Understanding_a_group_specialized_in_attacks.pdf
۸۹۸.۴۵ کیلوبایت
Author:joas antonio
https://ble.ir/cyberseclib
۱۸:۱۹
The Ultimate Kali Linux Book - Second Edition.pdf
۴۹.۳۴ مگابایت
Perform advanced penetration testing using Nmap, Metasploit, Aircrack-ng, and Empire
Author:Glen D. Singh
https://ble.ir/cyberseclib
۱۸:۲۱
Industrializing.Financial.Services.with.DevOps.pdf
۲۱.۹۶ مگابایت
Proven 360° DevOps operating model practices for enabling a multi-speed bank
Author:Spyridon Maniotis
#Financial_Services #DevOps #operating_model_practices
https://ble.ir/cyberseclib
۱۸:۳۲
Intelligent Mobile Malware Detection.pdf
۵.۸۵ مگابایت
Security, Privacy, and Trust in Mobile Communications
Author:Tony Thomas, Roopak Surendran and Teenu S. John
#Intelligent_Mobile #Malware_Detection#Security #Privacy #Trust_in_Mobile_Communications
https://ble.ir/cyberseclib
۱۸:۳۶
Packt.Cybersecurity.and.Privacy.Law.Handbook.pdf
۸.۶۴ مگابایت
A beginner’s guide to dealing with privacy and security while keeping hackers at bay
Author: Walter Rocchi
#Cybersecurity #Privacy_Law #hackers
https://ble.ir/cyberseclib
۱۸:۴۱
cta-2022-1213.pdf
۲.۴۳ مگابایت
CHINA Restrictive Laws Push Chinese Cybercrime toward Novel Monetization Techniques
#China #CYBER_THREAT_ANALYSIS#Restrictive_Laws #Cybercrime #Chinese_Cybercrime
https://ble.ir/cyberseclib
۱۸:۴۵
cta-2022-1215.pdf
۱.۵۵ مگابایت
2022 Adversary Infrastructure ReportBy Insikt Group
#Infrastructure #CYBER_THREAT #THREAT_ANALYSIS #
https://ble.ir/cyberseclib
۲۰:۴۹
FSI_Intelligence_Report_Masscan_Ransomware_Threat_Analysis_ReportEnglish.pdf
۴۰.۷۴ مگابایت
2022 Cyber Report
#Cyber_Threat #Threat_Intelligence#Operation_MaRS #MaRS #Ransomware #Threat_Analysis_Report
https://ble.ir/cyberseclib
۲۰:۵۳
221216.pdf
۷۰۷.۴۴ کیلوبایت
Joint Cybersecurity advisory
December 15, 2022
#Cybersecurity #Food_Products
https://ble.ir/cyberseclib
۲۰:۵۸
cta-2022-1205.pdf
۱.۲۹ مگابایت
CYBER THREAT ANALYSISRECORDED FUTURE
#Infrastructure #CYBER_THREAT #THREAT_ANALYSIS #Espionage #TAG53’s #Russia #Espionage_Operations
https://ble.ir/cyberseclib
۲۱:۰۲
Enisa_AAR_2022.pdf
۱.۵۸ مگابایت
Findings from a PAN-EUROPEAN cyber crisis Exercise
DECEMBER 2022
EUROPEAN UNION AGENCY FOR CYBERSECURITY
#cyber #crisis_Exercise #CYBERSECURITY
https://ble.ir/cyberseclib
۲۱:۰۵
POTENTIAL THREATS TO 5G NETWORK SLICING_508C_FINAL.PDF
۵۴۸.۱۸ کیلوبایت
#nsa #cisa #5G #5G_Network_Slicing #Potential_Threats
https://ble.ir/cyberseclib
۲۱:۱۰
2022_Encrypt,_Sign,_Attack_A_Compact_Introduction_to_Cryptography.pdf
۵.۹۴ مگابایت
Author: Olaf ManzMathematics Study Resources
Springer publisher
#Encrypt #Sign #Attack #cryptography#security
https://ble.ir/cyberseclib
۲۱:۱۶
Conceptual Guide to Enterprise Cyber Security 2023.pdf
۱.۳۵ مگابایت
Author : Tommy Babel
www.cyzea.io , CoFounder & CEO
#Information_Security #Enterprise_Information #cyber
https://ble.ir/cyberseclib
۳:۴۰