Video Training → Udemy - Ethical Hacking Windows Exploitation Basics
Published by: voska89 on 17-05-2022, 17:04 | 0
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 431 MB | Duration: 43m
Hack Windows Computers!
E-Books → Intellectual Property Valuation, Exploitation, and Infringement Damages, 2022 Cumulative Supplement, 5th Edition
Published by: voska89 on 1-04-2022, 11:15 | 0
English | 2022 | ISBN: 1119873592 | 96 pages | EPUB | 673.8 KB
Stay informed about every major and recent development in the law of intellectual property in the US In the 2022 Cumulative Supplement to the 5th edition of Intellectual Property: Valuation, Exploitation, and Infringement Damages, a renowned team of authors delivers a comprehensive and authoritative review of the most relevant and impactful changes to the legal regime governing intellectual property in the United States. Current to the year 2022, the Supplement explores the legislative and regulatory changes, as well as major developments in case law, affecting intellectual property in the US. An indispensable update for lawyers advising founders, entrepreneurs, and executives in any industry, and business leaders themselves, this volume is a one-stop resource covering every applicable recent change in a rapidly evolving area of the law.
E-Books → Hacking - The Art Of Exploitation, 2nd Edition By Jon Erickson
Published by: Emperor2011 on 27-03-2022, 01:40 | 0
Hacking - The Art Of Exploitation, 2nd Edition By Jon Erickson | 4.35 MB
English | 492 Pages
Title: Hacking: The Art of Exploitation, 2nd Edition
Author: Jon Erickson
Year: 2008
E-Books → The Style of Sleaze The American Exploitation Film, 1959-1977 by Calum Waddell PDF
Published by: Emperor2011 on 3-02-2022, 16:03 | 0
The Style of Sleaze The American Exploitation Film, 1959-1977 by Calum Waddell PDF | 3.36 MB
English | 216 Pages
Title: The Style of Sleaze
Author: Calum Waddell
Year: 2019
Video Training → Udemy - Linux Heap Exploitation - Part 3
Published by: voska89 on 18-12-2021, 02:43 | 0
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 11 lectures (5h 22m) | Size: 1.47 GB
Complete your GLIBC heap exploitation adventure with HeapLAB Part 3!
E-Books → Intellectual Property Valuation, Exploitation, and Infringement Damages, 2021 Cumulative Supplement, 5th Edition
Published by: voska89 on 19-11-2021, 05:12 | 0
English | 2021 | ISBN: 111980101X | 275 pages | True PDF EPUB | 4.25 MB
N/A
E-Books → Augmented Exploitation - Artificial Intelligence, Automation and Work
Published by: ad-team on 28-09-2021, 20:25 | 0
Augmented Exploitation - Artificial Intelligence, Automation and Work
pdf | 5.12 MB | English | Isbn: B08XMW722X | Author: Moore, Phoebe; Woodcock, Jamie; | Year: 2021
E-Books → Stuxnet to Sunburst 20 Years of Digital Exploitation and Cyber Warfare
Published by: voska89 on 27-08-2021, 10:04 | 0
English | 2021 | ISBN: 1032068493 | 198 pages | True PDF | 6.28 MB
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfaretakes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff,and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now.
Fromdigital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The solarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. Teh book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.
E-Books → Exploitation, Resettlement, Mass Murder
Published by: voska89 on 9-08-2021, 00:30 | 0
Alex J. Kay, "Exploitation, Resettlement, Mass Murder: Political and Economic Planning for German Occupation Policy in the Soviet Union, 1940-1941"
English | 2011 | ISBN: 0857451650 | EPUB | pages: 256 | 0.6 mb
[center]
E-Books → Agent-Based Modelling of Worker Exploitation Slave from the Machine
Published by: voska89 on 22-07-2021, 20:19 | 0
Agent-Based Modelling of Worker Exploitation: Slave from the Machine
English | 2021 | ISBN: 3030751333 | 190 Pages | PDF EPUB | 18 MB
This book illustrates the potential for computer simulation in the study of modern slavery and worker abuse, and by extension in all social issues. It lays out a philosophy of how agent-based modelling can be used in the social sciences. In addressing modern slavery, Chesney considers precarious work that is vulnerable to abuse, like sweat-shop labour and prostitution, and shows how agent modelling can be used to study, understand and fight abuse in these areas. He explores the philosophy, application and practice of agent modelling through the popular and free software NetLogo.