Login: Password:  Do not remember me

Categories




Video TrainingUdemy - Ethical Hacking Windows Exploitation Basics



Udemy - Ethical Hacking Windows Exploitation Basics
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 431 MB | Duration: 43m
Hack Windows Computers!



      Read more...         

E-BooksIntellectual Property Valuation, Exploitation, and Infringement Damages, 2022 Cumulative Supplement, 5th Edition





Intellectual Property Valuation, Exploitation, and Infringement Damages, 2022 Cumulative Supplement, 5th Edition
English | 2022 | ISBN: 1119873592 | 96 pages | EPUB | 673.8 KB
Stay informed about every major and recent development in the law of intellectual property in the US In the 2022 Cumulative Supplement to the 5th edition of Intellectual Property: Valuation, Exploitation, and Infringement Damages, a renowned team of authors delivers a comprehensive and authoritative review of the most relevant and impactful changes to the legal regime governing intellectual property in the United States. Current to the year 2022, the Supplement explores the legislative and regulatory changes, as well as major developments in case law, affecting intellectual property in the US. An indispensable update for lawyers advising founders, entrepreneurs, and executives in any industry, and business leaders themselves, this volume is a one-stop resource covering every applicable recent change in a rapidly evolving area of the law.



      Read more...         

E-BooksHacking - The Art Of Exploitation, 2nd Edition By Jon Erickson




Hacking - The Art Of Exploitation, 2nd Edition By Jon Erickson

Hacking - The Art Of Exploitation, 2nd Edition By Jon Erickson | 4.35 MB
English | 492 Pages

Title: Hacking: The Art of Exploitation, 2nd Edition
Author: Jon Erickson
Year: 2008




      Read more...         

E-BooksThe Style of Sleaze The American Exploitation Film, 1959-1977 by Calum Waddell PDF




The Style of Sleaze  The American Exploitation Film, 1959-1977 by Calum Waddell PDF

The Style of Sleaze The American Exploitation Film, 1959-1977 by Calum Waddell PDF | 3.36 MB
English | 216 Pages

Title: The Style of Sleaze
Author: Calum Waddell
Year: 2019




      Read more...         

Video TrainingUdemy - Linux Heap Exploitation - Part 3





Udemy - Linux Heap Exploitation - Part 3
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Genre: eLearning | Language: English + srt | Duration: 11 lectures (5h 22m) | Size: 1.47 GB
Complete your GLIBC heap exploitation adventure with HeapLAB Part 3!



      Read more...         

E-BooksIntellectual Property Valuation, Exploitation, and Infringement Damages, 2021 Cumulative Supplement, 5th Edition





Intellectual Property Valuation, Exploitation, and Infringement Damages, 2021 Cumulative Supplement, 5th Edition
English | 2021 | ISBN: 111980101X | 275 pages | True PDF EPUB | 4.25 MB
N/A



      Read more...         

E-BooksAugmented Exploitation - Artificial Intelligence, Automation and Work




Augmented Exploitation - Artificial Intelligence, Automation and Work


Augmented Exploitation - Artificial Intelligence, Automation and Work
pdf | 5.12 MB | English | Isbn:‎ B08XMW722X | Author: Moore, Phoebe; Woodcock, Jamie; | Year: 2021





      Read more...         

E-BooksStuxnet to Sunburst 20 Years of Digital Exploitation and Cyber Warfare




Stuxnet to Sunburst 20 Years of Digital Exploitation and Cyber Warfare
English | 2021 | ISBN: 1032068493 | 198 pages | True PDF | 6.28 MB
Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfaretakes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff,and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now.
Fromdigital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The solarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. Teh book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.



      Read more...         

E-BooksExploitation, Resettlement, Mass Murder





Exploitation, Resettlement, Mass Murder
Alex J. Kay, "Exploitation, Resettlement, Mass Murder: Political and Economic Planning for German Occupation Policy in the Soviet Union, 1940-1941"
English | 2011 | ISBN: 0857451650 | EPUB | pages: 256 | 0.6 mb

[center]



      Read more...         

E-BooksAgent-Based Modelling of Worker Exploitation Slave from the Machine





Agent-Based Modelling of Worker Exploitation Slave from the Machine
Agent-Based Modelling of Worker Exploitation: Slave from the Machine
English | 2021 | ISBN: 3030751333 | 190 Pages | PDF EPUB | 18 MB
This book illustrates the potential for computer simulation in the study of modern slavery and worker abuse, and by extension in all social issues. It lays out a philosophy of how agent-based modelling can be used in the social sciences. In addressing modern slavery, Chesney considers precarious work that is vulnerable to abuse, like sweat-shop labour and prostitution, and shows how agent modelling can be used to study, understand and fight abuse in these areas. He explores the philosophy, application and practice of agent modelling through the popular and free software NetLogo.



      Read more...         

Page:

Search



Updates




Friend Sites


» TinyDL
» DownTra
» 0dayHome

Your Link Here ?
(Pagerank 4 or above)