Secure Programming for Linux and Unix


Secure Programming for Linux and Unix

Secure Programming for Linux and Unix by David A. Wheeler
English | 2018 | ASIN: B07DV8DJD8 | 338 Pages | MOBI | 1007.68 KB

Download Now

AVG Secure VPN 1.5.664 Multilingual


AVG Secure VPN 1.5.664 Multilingual
File Size: 19.3 MB

AVG Secure VPN provides your PC with a secure and private internet connection without any restrictions. By using the app you can protect your internet connection by encrypting it, so no one can spy on your online activities. As a result, you can enjoy secure and private access to any site on the anywhere, at anytime. Without a VPN service, you could be vulnerable to cybercriminals, hackers, advertisers and even your internet service provider.
Download Now

EaseFilter Secure File Sharing SDK v. 4.4.2.3

EaseFilter Secure File Sharing SDK 4.4.2.3



EaseFilter Secure File Sharing SDK 4.4.2.3 3.17 MB


Create windows application to track, control and secure your files in one step with EaseFilter file system filter driver SDK. Dynamically control file access, grant or revoke the file access to the shared files anytime, anywhere.


OS: Win2000,WinXP,Win7 x32,Win7 x64,windows 8,windows 10,WinServer,WinOther,windows2000,windows2003,windows Server 2012,windows Tablet PC Edition 2005,windows Media Center Edition 2005,WinVista,windows Vista Starter,windows Vista Home Basic,windows Vista Home Premium,windows Vista Business,windows Vista Enterprise,windows Vista Ultimate,WinVista x64,windows Vista Home Basic x64,windows Vista Home Premium x64,windows Vista Business x64,windows Vista Enterprise x64,windows Vista Ultimate x64

Language: English

Download URL: http://www.easefilter.com/download/SecureShareSetup.exe

Read more: http://easefilter.com/Forums_Files/SecureShare.htm
Download Now

AWS Solutions Architecture Build Step by Step, a Fault-Tolerant, Scalable and Secure Web Stack


AWS Solutions Architecture Build Step by Step, a Fault-Tolerant, Scalable and Secure Web Stack

AWS Solutions Architecture: Build Step by Step, a Fault-Tolerant, Scalable and Secure Web Stack by Savitra Sirohi
English | 19 Feb. 2018 | ASIN: B079JZCLWD | 95 Pages | MOBI | 2.12 MB

Download Now

Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product


Supply Chain Risk Management Applying Secure Acquisition Principles to Ensure a Trusted Technology Product

Supply Chain Risk Management: Applying Secure Acquisition Principles to Ensure a Trusted Technology Product by Ken Sigler, Dan Shoemaker, Anne Kohnke
English | 2017 | ISBN: 1138197335 | 302 Pages | PDF | 12.5 MB
The book presents the concepts of ICT supply chain risk management from the perspective of NIST IR 800-161.

Download Now

Engineering Secure Software and Systems


Engineering Secure Software and Systems

Engineering Secure Software and Systems: 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings by Mathias Payer
English | PDF | 2018 | 143 Pages | ISBN : 3319944959 | 6.03 MB
This book constitutes the refereed proceedings of the 10th International Symposium on Engineering Secure Software and Systems, ESSoS 2018, held in Paris, France, in June 2018. The 10 papers, consisting of 7 regular and 3 idea papers, were carefully reviewed and selected from 26 submissions. They focus on the construction of secure software, which is becoming an increasingly challenging task due to the complexity of modern applications, the growing sophistication of security requirements, the multitude of available software technologies, and the progress of attack vectors.

Download Now

Cyrobo Secure File Deleter Pro 6.01 Multilingual

Cyrobo Secure File Deleter Pro 6.01 Multilingual

Cyrobo Secure File Deleter Pro 6.01 Multilingual | File size: 2.1 MB


Secure File Deleter allows you to completely and securely delete selected files from your system via an extremely user-friendly UI.As you know, when you delete a file or folder its still possible to recover it, even when placed in the recycle bin.Secure File Deleter aims to prevent recovery of those deleted files by replacing the contents with random data. You are given the choice of many security algorithms for data destruction. The program can write acombination of ones and zeroes onto each sector of your hard drive, or any other characters.

Download Now

Secure Coding: Preventing Insufficient Logging and Monitoring

Secure Coding: Preventing Insufficient Logging and Monitoring
Secure Coding: Preventing Insufficient Logging and Monitoring
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 1.5 Hours | 156 MB
Genre: eLearning | Language: English

Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time.
Download Now

Modern C++ Secure Coding Practices Const Correctness


Modern C++ Secure Coding Practices Const Correctness
Modern C++ Secure Coding Practices: Const Correctness
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 42M | 95 MB
Genre: eLearning | Language: English

This course will show you attacks hackers use against C++ programs and teach you how const correctness can prevent many of the bugs these attacks leverage.

Download Now

Ethical Hacking:Learn to secure,How Hackers hack anonymously

Ethical Hacking:Learn to secure,How Hackers hack anonymously
Ethical Hacking:Learn to secure,How Hackers hack anonymously | 2.27GB

Download Now