QuoVadis Posted July 23, 2015 Report Posted July 23, 2015 (edited) Pentru cei carora le place sa citeasca, si se descurca cu engleza, ofer gratuit capitole sau urmatoarele (255) carti intregi in format PDF de pe CRCnetBASE, majoritatea nu pot fi gasite pe torrente sau site-uri de ebooks grauite. Din anumite motive bine intemeiate, imi rezerv dreptul de a trimite aceste carti doar anumitor persoane. Tinand cont ca e un proces manual si trebuie sa imi iau niste masuri de siguranta, e posibil sa dureze ceva daca doriti multe carti sau am un backlog de cereri.Pentru a vedea un rezumat/abstract al cartii inainte sa o cereti, si pentru a salva timpul meu si al vostru, recomand mai intai sa dati un search pe pagina aceasta la titlul cartii in acest field si in dreapta va aparea un pdf gratuit cu rezumatul/abstractul/contents:Cererile doar prin mesaj privat, aici doar intrebari/nelamuriri/probleme va rog. Thx.UPDATE: Va rog pentru inceput sa cereti doar cate putin, cat cititi odata, nu la gramada tot ce pare fain, ca sa pot servi pe toata lumea. Cand terminati mai trimit - nu plec niciunde. Thx.Lista completa a cartilor:802.1X Port-Based AuthenticationA Practical Guide to Security AssessmentsA Practical Guide to Security Engineering and Information AssuranceA Technical Guide to IPSec Virtual Private NetworksAdaptive Security Management ArchitectureAdvances in Biometrics for Secure Human Authentication and RecognitionAlgebraic and Stochastic Coding TheoryAlgebraic Curves in CryptographyAlgorithmic CryptanalysisAn Introduction to Cryptography, Second EditionAndroid Malware and AnalysisAndroid Security, Attacks and DefensesAnonymous Communication Networks, Protecting Privacy on the WebArchitecting Secure Software SystemsAssessing and Managing Security Risk in IT Systems, A Structured MethodologyAsset Protection and Security Management HandbookAsset Protection through Security AwarenessAudit and Trace Log Management, Consolidation and AnalysisAuthentication Codes and Combinatorial DesignsAutomatic Defense Against Zero-day Polymorphic Worms in Communication NetworksBuilding A Global Information Assurance ProgramBuilding an Effective Information Security Policy ArchitectureBuilding an Information Security Awareness ProgramBuilding and Implementing a Security Certification and Accreditation Program, OFFICIAL (ISC)2 GUIDE to the CAPcm CBKBusiness Resumption PlanningCall Center Continuity PlanningCase Studies in Intelligent Computing, Achievements and TrendsCase Studies in Secure Computing, Achievements and TrendsCISO Soft Skills, Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant PerspectivesCISO's Guide to Penetration Testing, A Framework to Plan, Manage, and Maximize BenefitsComplete Book of Remote Access, Connectivity and SecurityComplete Guide to CISM CertificationComplete Guide to Security and Privacy Metrics, Measuring Regulatory Compliance, Operational Resilience, and ROIComputer Security Literacy, Staying Safe in a Digital WorldConducting Network Penetration and Espionage in a Global EnvironmentConflict and Cooperation in Cyberspace, The Challenge to National SecurityCore Software Security, Security at the SourceCritical Incident ManagementCritical Infrastructure System Security and ResiliencyCritical Infrastructure, Understanding Its Component Parts, Vulnerabilities, Operating Risks, and InterdependenciesCryptanalysis of RSA and Its VariantsCultural Property Security, Protecting Museums, Historic Sites, Archives, and LibrariesCuring the Patch Management HeadacheCyber Crime Investigator's Field Guide, Second EditionCyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer CrimesCyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second EditionCyber Fraud, Tactics, Techniques and ProceduresCyber Power, Crime, Conflict and Security in CyberspaceCyber Security EssentialsCybersecurity for Industrial Control Systems, SCADA, DCS, PLC, HMI, and SISCybersecurity, Public Sector Threats and ResponsesCybervetting, Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second EditionData Governance, Creating Value from Information AssetsData Mining and Machine Learning in CybersecurityData Mining Tools for Malware DetectionData Privacy for the Smart GridData Protection, Governance, Risk Management, and ComplianceDatabase and Applications Security, Integrating Information Security and Data ManagementData-driven Block Ciphers for Fast Telecommunication SystemsDefense against the Black Arts, How Hackers Do What They Do and How to Protect against ItDeveloping and Securing the CloudDigital Forensics for Handheld DevicesDigital Privacy, Theory, Technologies, and PracticesDiscrete Dynamical Systems and Chaotic Machines, Theory and ApplicationsDisruptive Security Technologies with Mobile Code and Peer-to-Peer NetworksDistributed Networks, Intelligence, Security, and ApplicationsEffective Surveillance for Homeland Security, Balancing Technology and Social IssuesEffective Use of Teams for IT AuditsElliptic Curves, Number Theory and Cryptography, Second EditionGroup Theoretic CryptographyHandbook of Applied CryptographyHandbook of Elliptic and Hyperelliptic Curve CryptographyHandbook of Financial Cryptography and SecurityHandbook of Finite FieldsHandbook of Surveillance Technologies, Third EditionHardware Security, Design, Threats, and SafeguardsHomeland Security and Private Sector Business, Corporations' Role in Critical Infrastructure ProtectionHomeland Security HandbookHow to Develop and Implement a Security Master PlanIndustrial Espionage, Developing a Counterespionage ProgramInformation Assurance ArchitectureInformation Security Architecture, An Integrated Approach to Security in the OrganizationInformation Security Architecture, An Integrated Approach to Security in the Organization, Second EditionInformation Security Cost ManagementInformation Security Fundamentals, Second EditionInformation Security Governance Simplified, From the Boardroom to the KeyboardInformation Security Management Handbook on CD-ROM, 2006 EditionInformation Security Management Handbook, Fifth Edition, Volume 3Information Security Management Handbook, Four Volume SetInformation Security Management Handbook, Fourth Edition, Volume 4Information Security Management Handbook, Sixth EditionInformation Security Management Handbook, Sixth Edition, Volume 2Information Security Management Handbook, Sixth Edition, Volume 3Information Security Management Handbook, Sixth Edition, Volume 4Information Security Management Handbook, Sixth Edition, Volume 5Information Security Management Handbook, Sixth Edition, Volume 6Information Security Management Handbook, Volume 2Insider Computer Fraud, An In-depth Framework for Detecting and Defending against Insider IT AttacksIntelligent Network Video, Understanding Modern Video Surveillance SystemsIntelligent Video Surveillance, Systems and TechnologyInvestigations in the Workplace, Second EditionInvestigator's Guide to SteganographyIris Biometric Model for Secured Network AccessIT Auditing and Sarbanes-Oxley Compliance, Key Strategies for Business ImprovementIT Security Governance Guidebook with Security Program Metrics on CD-ROMLattice Basis Reduction, An Introduction to the LLL Algorithm and Its ApplicationsMachine Learning Forensics for Law Enforcement, Security, and IntelligenceMalicious Bots, An Inside Look into the Cyber-Criminal Underground of the InternetManaging A Network Vulnerability AssessmentManaging an Information Security and Privacy Awareness and Training ProgramManaging an Information Security and Privacy Awareness and Training Program, Second EditionManaging Risk and Security in Outsourcing IT Services, Onshore, Offshore and the CloudManaging the Insider Threat, No Dark CornersManaging Trust in CyberspaceMechanics of User Identification and Authentication, Fundamentals of Identity ManagementMultilevel Modeling of Secure Systems in QoP-MLMultilevel Security for Relational DatabasesMultimedia Content Encryption, Techniques and ApplicationsMultimedia Encryption and Authentication Techniques and ApplicationsMultimedia Security HandbookMultimedia Security, Watermarking, Steganography, and ForensicsMultimedia Watermarking Techniques and ApplicationsMultiple-Base Number System, Theory and ApplicationsNetwork and Application Security, Fundamentals and PracticesNetwork Anomaly Detection, A Machine Learning PerspectiveNetwork Attacks and Defenses, A Hands-on ApproachNetwork Perimeter Security, Building Defense In-DepthNetwork Security TechnologiesNew Directions of Modern CryptographyNoiseless Steganography, The Key to Covert CommunicationsOfficial (ISC)2 Guide to the CISSP CBKOfficial (ISC)2 Guide to the CISSP CBK, Second EditionOfficial (ISC)2 Guide to the CISSP CBK, Third EditionOfficial (ISC)2 Guide to the CISSP ExamOfficial (ISC)2 Guide to the CSSLPOfficial (ISC)2 Guide to the CSSLP CBK, Second EditionOfficial (ISC)2 Guide to the HCISPP CBKOfficial (ISC)2 Guide to the SSCP CBKOfficial (ISC)2 Guide to the SSCP CBK, Second EditionOfficial (ISC)2® Guide to the CAP® CBK®, Second EditionOfficial (ISC)2® Guide to the CCFP CBKOfficial (ISC)2® Guide to the ISSAP® CBKOfficial (ISC)2® Guide to the ISSAP® CBK, Second EditionOfficial (ISC)2® Guide to the ISSEP® CBK®, Second EditionOfficial (ISC)2® Guide to the ISSMP® CBK®Optical Coding Theory with PrimeOracle Identity Management, Governance, Risk, and Compliance Architecture, Third EditionPCI Compliance, The Definitive GuidePearls of Discrete MathematicsPhysical Security and Safety, A Field Guide for the PractitionerPractical Cryptography, Algorithms and Implementations Using C++Practical Hacking Techniques and CountermeasuresPractical Risk Management for the CIOPRAGMATIC Security Metrics, Applying Metametrics to Information SecurityPrivacy-Aware Knowledge Discovery, Novel Applications and New TechniquesProfiling Hackers, The Science of Criminal Profiling as Applied to the World of HackingProtocols for Secure Electronic Commerce, Second EditionPublic Key Infrastructure, Building Trusted Applications and Web ServicesQuantum Communications and CryptographyRC4 Stream Cipher and Its VariantsResponsive Security, Be Ready to Be SecureRSA and Public-Key CryptographySecure and Resilient Software DevelopmentSecure and Resilient Software, Requirements, Test Cases, and Testing MethodsSecure Computers and Networks, Analysis, Design, and ImplementationSecure Data Provenance and Inference Control with Semantic WebSecure Internet Practices, Best Practices for Securing Systems in the Internet and e-Business AgeSecure Java, For Web Application DevelopmentSecure Semantic Service-Oriented SystemsSecuring and Controlling Cisco RoutersSecuring Cloud and Mobility, A Practitioner's GuideSecuring Converged IP NetworksSecuring E-Business Applications and CommunicationsSecuring Systems, Applied Security Architecture and Threat ModelsSecuring Windows NT/2000, From Policies to FirewallsSecurity and Policy Driven ComputingSecurity and Privacy in Smart GridsSecurity De-Engineering, Solving the Problems in Information Risk ManagementSecurity for Service Oriented ArchitecturesSecurity for Wireless Sensor Networks using Identity-Based CryptographySecurity in an IPv6 EnvironmentSecurity in Distributed, Grid, Mobile, and Pervasive ComputingSecurity in RFID and Sensor NetworksSecurity Management, A Critical Thinking ApproachSecurity of Mobile CommunicationsSecurity Patch ManagementSecurity Software Development, Assessing and Managing Security RisksSecurity Strategy, From Requirements to RealitySecurity without Obscurity, A Guide to Confidentiality, Authentication, and IntegritySmart Grid Security, An End-to-End View of Security in the New Electrical GridSoftware Deployment, Updating, and PatchingSoftware Test Attacks to Break Mobile and Embedded DevicesStandard for Auditing Computer Applications, Second EditionStatistical Methods in Computer SecurityStrategic Information SecuritySurviving Security, How to Integrate People, Process, and TechnologyTesting Code SecurityThe ABCs of LDAP, How to Install, Run, and Administer LDAP ServicesThe CISO Handbook, A PRACTICAL GUIDE TO SECURING YOUR COMPANYThe Complete Book of Data Anonymization, From Planning to ImplementationThe Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security RulesThe Ethical Hack, A Framework for Business Value Penetration TestingThe Hacker's Handbook, The Strategy Behind Breaking into and Defending NetworksThe Laws of Software Process, A New Model for the Production and Management of SoftwareThe Practical Guide to HIPAA Privacy and Security ComplianceThe Practical Guide to HIPAA Privacy and Security Compliance, Second EditionThe Privacy Papers, Managing Technology, Consumer, Employee and Legislative ActionsThe Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk AssessmentsThe Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments, Second EditionThe State of the Art in Intrusion Prevention and DetectionThe Total CISSP Exam Prep Book, Practice Questions, Answers, and Test Taking Tips and TechniquesTrade Secret Theft, Industrial Espionage, and the China ThreatUnauthorized Access, The Crisis in Online Privacy and SecurityUnderstanding Surveillance Technologies, Spy Devices, Privacy, History & Applications, Second EditionUnderstanding Surveillance Technologies, Spy Devices, Their Origins & ApplicationsUNIX Administration, A Comprehensive Sourcebook for Effective Systems & Network ManagementUsing the Common Criteria for IT Security EvaluationVein Pattern Recognition, A Privacy-Enhancing BiometricVerification of Computer Codes in Computational Science and EngineeringVisual Cryptography and Secret Image SharingVulnerability ManagementWatermarking Systems Engineering, Enabling Digital Assets Security and Other ApplicationsWeb Security, A WhiteHat PerspectiveWhat Every Engineer Should Know About Cyber Security and Digital ForensicsWindows Networking Tools, The Complete Guide to Management, Troubleshooting, and SecurityWireless Crime and Forensic InvestigationWireless Multimedia Communication Systems, Design, Analysis, and ImplementationWireless Security Edited July 25, 2015 by aa7670 deleting duplicates 4 1 Quote
anotherboy Posted July 23, 2015 Report Posted July 23, 2015 Imi poti oferii si mie, te rog, aceste carti?Network and Application Security, Fundamentals and PracticesNetwork Anomaly Detection, A Machine Learning PerspectiveNetwork Anomaly Detection, A Machine Learning PerspectiveNetwork Attacks and Defenses, A Hands-on ApproachNetwork Perimeter Security, Building Defense In-DepthNetwork Security Technologies Quote
QuoVadis Posted July 23, 2015 Author Report Posted July 23, 2015 Imi poti oferii si mie, te rog, aceste carti?Network and Application Security, Fundamentals and PracticesNetwork Anomaly Detection, A Machine Learning PerspectiveNetwork Anomaly Detection, A Machine Learning PerspectiveNetwork Attacks and Defenses, A Hands-on ApproachNetwork Perimeter Security, Building Defense In-DepthNetwork Security TechnologiesDin anumite motive bine intemeiate, imi rezerv dreptul de a trimite aceste carti doar anumitor persoane.Cererile doar prin mesaj privat, aici doar intrebari/nelamuriri/probleme va rog. Thx.Sorry, nu. Quote
Active Members SynTAX Posted July 24, 2015 Active Members Report Posted July 24, 2015 Mersi de carti. Quote
QuoVadis Posted July 24, 2015 Author Report Posted July 24, 2015 Atunci de ce kilu' meuCa sa intrebe prostii si sa crape haterii. Mori cretinule, daca vreau sa fac un bine nu trebuie sa iti dau tie explicatii!(Daca stau sa ma gandesc ar fi o categorie mai buna unde sa le bag pe toate + 1 carnat: in portul usb, dupa ce deschid portile unei femele dragi tie.)P.S. - multumesc ca de obicei moderatorilor si administratorilor care inchid ochii, 10000a oara, la offtopicul facut de aceasta creatura. 1 1 Quote
rrremapped Posted July 24, 2015 Report Posted July 24, 2015 Ca sa intrebe prostii si sa crape haterii. Mori cretinule, daca vreau sa fac un bine nu trebuie sa iti dau tie explicatii!(Daca stau sa ma gandesc ar fi o categorie mai buna unde sa le bag pe toate + 1 carnat: in portul usb, dupa ce deschid portile unei femele dragi tie.)P.S. - multumesc ca de obicei moderatorilor si administratorilor care inchid ochii, 10000a oara, la offtopicul facut de aceasta creatura.da-ti foc.Daca pui ceva la free stuff pai free sa fie nepotule. Quote
QuoVadis Posted July 24, 2015 Author Report Posted July 24, 2015 da-ti foc.Daca pui ceva la free stuff pai free sa fie nepotule.Toate acestea free le-am dat de aseara si pana acum la mai multi utilizatori pe privat copil prost facut pentru alocatie, nu am cerut nici un ban pentru ele. Quote
QuoVadis Posted August 3, 2015 Author Report Posted August 3, 2015 Arhiva cu 40 ebooks (406.2MB) care mi s-au cerut pana acum:Link download (valabil 7 zile) -.... - - .--. ... ---··· -··-· -··-· .-- .-- .-- ·-·-·- .-- . - .-. .- -. ... ..-. . .-. ·-·-·- -.-. --- -- -··-· -.. --- .-- -. .-.. --- .- -.. ... -··-· ..... . ..... -... ..... .---- ...-- -.-. --... ..-. ----. ..... . .- -.... -... -.. .- .- -.. --... .- .- ..--- -.-. -.-. ...-- -.. ---.. -... ----- ...-- ..--- ----- .---- ..... ----- ---.. ----- ...-- .---- ..--- ..--- ..... ..--- ....- -··-· ---.. ..--- -.. ...-- ----- -....Titluri incluse:802.1X Port-Based AuthenticationA Technical Guide to IPSec Virtual Private NetworksAlgebraic and Stochastic Coding TheoryAlgebraic Curves in CryptographyAlgorithmic CryptanalysisAn Introduction to Cryptography, Second EditionAndroid Malware and AnalysisAndroid Security, Attacks and DefensesAnonymous Communication Networks, Protecting Privacy on the WebBuilding A Global Information Assurance ProgramCritical Incident ManagementCyber CriminologyCyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, First EdCyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second EdCyber Fraud, Tactics, Techniques and ProceduresCyber Security EssentialsCybervetting, Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second EditionData Governance, Creating Value from Information AssetsData Mining and Machine Learning in CybersecurityData Mining Tools for Malware DetectionDigital Forensics for Handheld DevicesEffective Surveillance for Homeland Security, Balancing Technology and Social IssuesEffective Use of Teams for IT AuditsEnd to End Adaptive Congestion Control in TCP-IP NetworksInformation Security Fundamentals, Second EditionInsider Computer Fraud, An In-depth Framework for Detecting and Defending against Insider IT AttacksJava Programming for EngineersMaking IT LeanMalicious Bots, An Inside Look into the Cyber-Criminal Underground of the InternetMultilevel Modeling of Secure Systems in QoP-MLNetwork Security TechnologiesNew Directions of Modern CryptographyNoiseless Steganography - The Key to Covert CommunicationsPearls of Discrete MathematicsPractical Cryptography, Algorithms and Implementations Using C++Practical Hacking Techniques and CountermeasuresProfiling HackersSecurity for Service Oriented ArchitecturesThe Complete Book of Data Anonymization, From Planning to ImplementationTrade Secret Theft, Industrial Espionage, and the China Threat 1 Quote
QuoVadis Posted September 19, 2015 Author Report Posted September 19, 2015 Ultimele 5 trimise la cerere - WeTransfer- Official (ISC)2 Guide to the SSCP CBK (1st edition)- Official (ISC)2 Guide to the SSCP CBK (2nd edition)- Official (ISC)2 Guide to the SSCP CBK (3rd edition)- Official (ISC)2 Guide to the CISSP Exam- The Total CISSP Exam Prep Book Quote
mirtomi Posted July 17, 2017 Report Posted July 17, 2017 Salut, ai putea sa imi trimiti si mie cartile, te rog? Multumesc mult. Quote
Jubasa Posted August 15, 2017 Report Posted August 15, 2017 Imi poti oferii si mie, te rog, aceste carti? Mechanics of User Identification and Authentication, Fundamentals of Identity Management and An Introduction to Cryptography, Second Edition tks Quote
QuoVadis Posted August 15, 2017 Author Report Posted August 15, 2017 19 minutes ago, Jubasa said: Imi poti oferii si mie, te rog, aceste carti? Mechanics of User Identification and Authentication, Fundamentals of Identity Management and An Introduction to Cryptography, Second Edition tks Sorry, dar accesul meu la respectivul catalog online mi-a fost modificat. Am pierdut accesul la unele resurse electronice si am capatat acces la altele. Asta din pacate este unul din titlurile la care nu mai am acces. Quote