Jump to content
QuoVadis

255 Ebooks gratuite de pe CRCnetBASE

Recommended Posts

Pentru cei carora le place sa citeasca, si se descurca cu engleza, ofer gratuit capitole sau urmatoarele (255) carti intregi in format PDF de pe CRCnetBASE, majoritatea nu pot fi gasite pe torrente sau site-uri de ebooks grauite. Din anumite motive bine intemeiate, imi rezerv dreptul de a trimite aceste carti doar anumitor persoane. Tinand cont ca e un proces manual si trebuie sa imi iau niste masuri de siguranta, e posibil sa dureze ceva daca doriti multe carti sau am un backlog de cereri.

Pentru a vedea un rezumat/abstract al cartii inainte sa o cereti, si pentru a salva timpul meu si al vostru, recomand mai intai sa dati un search pe pagina aceasta la titlul cartii in acest field si in dreapta va aparea un pdf gratuit cu rezumatul/abstractul/contents:

ebooks.jpg

Cererile doar prin mesaj privat, aici doar intrebari/nelamuriri/probleme va rog. Thx.

UPDATE: Va rog pentru inceput sa cereti doar cate putin, cat cititi odata, nu la gramada tot ce pare fain, ca sa pot servi pe toata lumea. Cand terminati mai trimit - nu plec niciunde. :) Thx.

Lista completa a cartilor:

802.1X Port-Based Authentication

A Practical Guide to Security Assessments

A Practical Guide to Security Engineering and Information Assurance

A Technical Guide to IPSec Virtual Private Networks

Adaptive Security Management Architecture

Advances in Biometrics for Secure Human Authentication and Recognition

Algebraic and Stochastic Coding Theory

Algebraic Curves in Cryptography

Algorithmic Cryptanalysis

An Introduction to Cryptography, Second Edition

Android Malware and Analysis

Android Security, Attacks and Defenses

Anonymous Communication Networks, Protecting Privacy on the Web

Architecting Secure Software Systems

Assessing and Managing Security Risk in IT Systems, A Structured Methodology

Asset Protection and Security Management Handbook

Asset Protection through Security Awareness

Audit and Trace Log Management, Consolidation and Analysis

Authentication Codes and Combinatorial Designs

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

Building A Global Information Assurance Program

Building an Effective Information Security Policy Architecture

Building an Information Security Awareness Program

Building and Implementing a Security Certification and Accreditation Program, OFFICIAL (ISC)2 GUIDE to the CAPcm CBK

Business Resumption Planning

Call Center Continuity Planning

Case Studies in Intelligent Computing, Achievements and Trends

Case Studies in Secure Computing, Achievements and Trends

CISO Soft Skills, Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives

CISO's Guide to Penetration Testing, A Framework to Plan, Manage, and Maximize Benefits

Complete Book of Remote Access, Connectivity and Security

Complete Guide to CISM Certification

Complete Guide to Security and Privacy Metrics, Measuring Regulatory Compliance, Operational Resilience, and ROI

Computer Security Literacy, Staying Safe in a Digital World

Conducting Network Penetration and Espionage in a Global Environment

Conflict and Cooperation in Cyberspace, The Challenge to National Security

Core Software Security, Security at the Source

Critical Incident Management

Critical Infrastructure System Security and Resiliency

Critical Infrastructure, Understanding Its Component Parts, Vulnerabilities, Operating Risks, and Interdependencies

Cryptanalysis of RSA and Its Variants

Cultural Property Security, Protecting Museums, Historic Sites, Archives, and Libraries

Curing the Patch Management Headache

Cyber Crime Investigator's Field Guide, Second Edition

Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes

Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition

Cyber Fraud, Tactics, Techniques and Procedures

Cyber Power, Crime, Conflict and Security in Cyberspace

Cyber Security Essentials

Cybersecurity for Industrial Control Systems, SCADA, DCS, PLC, HMI, and SIS

Cybersecurity, Public Sector Threats and Responses

Cybervetting, Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

Data Governance, Creating Value from Information Assets

Data Mining and Machine Learning in Cybersecurity

Data Mining Tools for Malware Detection

Data Privacy for the Smart Grid

Data Protection, Governance, Risk Management, and Compliance

Database and Applications Security, Integrating Information Security and Data Management

Data-driven Block Ciphers for Fast Telecommunication Systems

Defense against the Black Arts, How Hackers Do What They Do and How to Protect against It

Developing and Securing the Cloud

Digital Forensics for Handheld Devices

Digital Privacy, Theory, Technologies, and Practices

Discrete Dynamical Systems and Chaotic Machines, Theory and Applications

Disruptive Security Technologies with Mobile Code and Peer-to-Peer Networks

Distributed Networks, Intelligence, Security, and Applications

Effective Surveillance for Homeland Security, Balancing Technology and Social Issues

Effective Use of Teams for IT Audits

Elliptic Curves, Number Theory and Cryptography, Second Edition

Group Theoretic Cryptography

Handbook of Applied Cryptography

Handbook of Elliptic and Hyperelliptic Curve Cryptography

Handbook of Financial Cryptography and Security

Handbook of Finite Fields

Handbook of Surveillance Technologies, Third Edition

Hardware Security, Design, Threats, and Safeguards

Homeland Security and Private Sector Business, Corporations' Role in Critical Infrastructure Protection

Homeland Security Handbook

How to Develop and Implement a Security Master Plan

Industrial Espionage, Developing a Counterespionage Program

Information Assurance Architecture

Information Security Architecture, An Integrated Approach to Security in the Organization

Information Security Architecture, An Integrated Approach to Security in the Organization, Second Edition

Information Security Cost Management

Information Security Fundamentals, Second Edition

Information Security Governance Simplified, From the Boardroom to the Keyboard

Information Security Management Handbook on CD-ROM, 2006 Edition

Information Security Management Handbook, Fifth Edition, Volume 3

Information Security Management Handbook, Four Volume Set

Information Security Management Handbook, Fourth Edition, Volume 4

Information Security Management Handbook, Sixth Edition

Information Security Management Handbook, Sixth Edition, Volume 2

Information Security Management Handbook, Sixth Edition, Volume 3

Information Security Management Handbook, Sixth Edition, Volume 4

Information Security Management Handbook, Sixth Edition, Volume 5

Information Security Management Handbook, Sixth Edition, Volume 6

Information Security Management Handbook, Volume 2

Insider Computer Fraud, An In-depth Framework for Detecting and Defending against Insider IT Attacks

Intelligent Network Video, Understanding Modern Video Surveillance Systems

Intelligent Video Surveillance, Systems and Technology

Investigations in the Workplace, Second Edition

Investigator's Guide to Steganography

Iris Biometric Model for Secured Network Access

IT Auditing and Sarbanes-Oxley Compliance, Key Strategies for Business Improvement

IT Security Governance Guidebook with Security Program Metrics on CD-ROM

Lattice Basis Reduction, An Introduction to the LLL Algorithm and Its Applications

Machine Learning Forensics for Law Enforcement, Security, and Intelligence

Malicious Bots, An Inside Look into the Cyber-Criminal Underground of the Internet

Managing A Network Vulnerability Assessment

Managing an Information Security and Privacy Awareness and Training Program

Managing an Information Security and Privacy Awareness and Training Program, Second Edition

Managing Risk and Security in Outsourcing IT Services, Onshore, Offshore and the Cloud

Managing the Insider Threat, No Dark Corners

Managing Trust in Cyberspace

Mechanics of User Identification and Authentication, Fundamentals of Identity Management

Multilevel Modeling of Secure Systems in QoP-ML

Multilevel Security for Relational Databases

Multimedia Content Encryption, Techniques and Applications

Multimedia Encryption and Authentication Techniques and Applications

Multimedia Security Handbook

Multimedia Security, Watermarking, Steganography, and Forensics

Multimedia Watermarking Techniques and Applications

Multiple-Base Number System, Theory and Applications

Network and Application Security, Fundamentals and Practices

Network Anomaly Detection, A Machine Learning Perspective

Network Attacks and Defenses, A Hands-on Approach

Network Perimeter Security, Building Defense In-Depth

Network Security Technologies

New Directions of Modern Cryptography

Noiseless Steganography, The Key to Covert Communications

Official (ISC)2 Guide to the CISSP CBK

Official (ISC)2 Guide to the CISSP CBK, Second Edition

Official (ISC)2 Guide to the CISSP CBK, Third Edition

Official (ISC)2 Guide to the CISSP Exam

Official (ISC)2 Guide to the CSSLP

Official (ISC)2 Guide to the CSSLP CBK, Second Edition

Official (ISC)2 Guide to the HCISPP CBK

Official (ISC)2 Guide to the SSCP CBK

Official (ISC)2 Guide to the SSCP CBK, Second Edition

Official (ISC)2® Guide to the CAP® CBK®, Second Edition

Official (ISC)2® Guide to the CCFP CBK

Official (ISC)2® Guide to the ISSAP® CBK

Official (ISC)2® Guide to the ISSAP® CBK, Second Edition

Official (ISC)2® Guide to the ISSEP® CBK®, Second Edition

Official (ISC)2® Guide to the ISSMP® CBK®

Optical Coding Theory with Prime

Oracle Identity Management, Governance, Risk, and Compliance Architecture, Third Edition

PCI Compliance, The Definitive Guide

Pearls of Discrete Mathematics

Physical Security and Safety, A Field Guide for the Practitioner

Practical Cryptography, Algorithms and Implementations Using C++

Practical Hacking Techniques and Countermeasures

Practical Risk Management for the CIO

PRAGMATIC Security Metrics, Applying Metametrics to Information Security

Privacy-Aware Knowledge Discovery, Novel Applications and New Techniques

Profiling Hackers, The Science of Criminal Profiling as Applied to the World of Hacking

Protocols for Secure Electronic Commerce, Second Edition

Public Key Infrastructure, Building Trusted Applications and Web Services

Quantum Communications and Cryptography

RC4 Stream Cipher and Its Variants

Responsive Security, Be Ready to Be Secure

RSA and Public-Key Cryptography

Secure and Resilient Software Development

Secure and Resilient Software, Requirements, Test Cases, and Testing Methods

Secure Computers and Networks, Analysis, Design, and Implementation

Secure Data Provenance and Inference Control with Semantic Web

Secure Internet Practices, Best Practices for Securing Systems in the Internet and e-Business Age

Secure Java, For Web Application Development

Secure Semantic Service-Oriented Systems

Securing and Controlling Cisco Routers

Securing Cloud and Mobility, A Practitioner's Guide

Securing Converged IP Networks

Securing E-Business Applications and Communications

Securing Systems, Applied Security Architecture and Threat Models

Securing Windows NT/2000, From Policies to Firewalls

Security and Policy Driven Computing

Security and Privacy in Smart Grids

Security De-Engineering, Solving the Problems in Information Risk Management

Security for Service Oriented Architectures

Security for Wireless Sensor Networks using Identity-Based Cryptography

Security in an IPv6 Environment

Security in Distributed, Grid, Mobile, and Pervasive Computing

Security in RFID and Sensor Networks

Security Management, A Critical Thinking Approach

Security of Mobile Communications

Security Patch Management

Security Software Development, Assessing and Managing Security Risks

Security Strategy, From Requirements to Reality

Security without Obscurity, A Guide to Confidentiality, Authentication, and Integrity

Smart Grid Security, An End-to-End View of Security in the New Electrical Grid

Software Deployment, Updating, and Patching

Software Test Attacks to Break Mobile and Embedded Devices

Standard for Auditing Computer Applications, Second Edition

Statistical Methods in Computer Security

Strategic Information Security

Surviving Security, How to Integrate People, Process, and Technology

Testing Code Security

The ABCs of LDAP, How to Install, Run, and Administer LDAP Services

The CISO Handbook, A PRACTICAL GUIDE TO SECURING YOUR COMPANY

The Complete Book of Data Anonymization, From Planning to Implementation

The Definitive Guide to Complying with the HIPAA/HITECH Privacy and Security Rules

The Ethical Hack, A Framework for Business Value Penetration Testing

The Hacker's Handbook, The Strategy Behind Breaking into and Defending Networks

The Laws of Software Process, A New Model for the Production and Management of Software

The Practical Guide to HIPAA Privacy and Security Compliance

The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition

The Privacy Papers, Managing Technology, Consumer, Employee and Legislative Actions

The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments

The Security Risk Assessment Handbook, A Complete Guide for Performing Security Risk Assessments, Second Edition

The State of the Art in Intrusion Prevention and Detection

The Total CISSP Exam Prep Book, Practice Questions, Answers, and Test Taking Tips and Techniques

Trade Secret Theft, Industrial Espionage, and the China Threat

Unauthorized Access, The Crisis in Online Privacy and Security

Understanding Surveillance Technologies, Spy Devices, Privacy, History & Applications, Second Edition

Understanding Surveillance Technologies, Spy Devices, Their Origins & Applications

UNIX Administration, A Comprehensive Sourcebook for Effective Systems & Network Management

Using the Common Criteria for IT Security Evaluation

Vein Pattern Recognition, A Privacy-Enhancing Biometric

Verification of Computer Codes in Computational Science and Engineering

Visual Cryptography and Secret Image Sharing

Vulnerability Management

Watermarking Systems Engineering, Enabling Digital Assets Security and Other Applications

Web Security, A WhiteHat Perspective

What Every Engineer Should Know About Cyber Security and Digital Forensics

Windows Networking Tools, The Complete Guide to Management, Troubleshooting, and Security

Wireless Crime and Forensic Investigation

Wireless Multimedia Communication Systems, Design, Analysis, and Implementation

Wireless Security

Edited by aa7670
deleting duplicates
  • Upvote 4
  • Downvote 1
Link to post
Share on other sites

Imi poti oferii si mie, te rog, aceste carti?

Network and Application Security, Fundamentals and Practices

Network Anomaly Detection, A Machine Learning Perspective

Network Anomaly Detection, A Machine Learning Perspective

Network Attacks and Defenses, A Hands-on Approach

Network Perimeter Security, Building Defense In-Depth

Network Security Technologies

Link to post
Share on other sites
Imi poti oferii si mie, te rog, aceste carti?

Network and Application Security, Fundamentals and Practices

Network Anomaly Detection, A Machine Learning Perspective

Network Anomaly Detection, A Machine Learning Perspective

Network Attacks and Defenses, A Hands-on Approach

Network Perimeter Security, Building Defense In-Depth

Network Security Technologies

Din anumite motive bine intemeiate, imi rezerv dreptul de a trimite aceste carti doar anumitor persoane.
Cererile doar prin mesaj privat, aici doar intrebari/nelamuriri/probleme va rog. Thx.

Sorry, nu.

Link to post
Share on other sites
Atunci de ce kilu' meu

Ca sa intrebe prostii si sa crape haterii. Mori cretinule, daca vreau sa fac un bine nu trebuie sa iti dau tie explicatii!

(Daca stau sa ma gandesc ar fi o categorie mai buna unde sa le bag pe toate + 1 carnat: in portul usb, dupa ce deschid portile unei femele dragi tie.)

P.S. - multumesc ca de obicei moderatorilor si administratorilor care inchid ochii, 10000a oara, la offtopicul facut de aceasta creatura.

  • Upvote 1
  • Downvote 1
Link to post
Share on other sites
Ca sa intrebe prostii si sa crape haterii. Mori cretinule, daca vreau sa fac un bine nu trebuie sa iti dau tie explicatii!

(Daca stau sa ma gandesc ar fi o categorie mai buna unde sa le bag pe toate + 1 carnat: in portul usb, dupa ce deschid portile unei femele dragi tie.)

P.S. - multumesc ca de obicei moderatorilor si administratorilor care inchid ochii, 10000a oara, la offtopicul facut de aceasta creatura.

da-ti foc.Daca pui ceva la free stuff pai free sa fie nepotule.

Link to post
Share on other sites
da-ti foc.Daca pui ceva la free stuff pai free sa fie nepotule.

Toate acestea free le-am dat de aseara si pana acum la mai multi utilizatori pe privat copil prost facut pentru alocatie, nu am cerut nici un ban pentru ele.

image.jpg

Link to post
Share on other sites

Arhiva cu 40 ebooks (406.2MB) care mi s-au cerut pana acum:

Link download (valabil 7 zile) -

.... - - .--. ... ---··· -··-· -··-· .-- .-- .-- ·-·-·- .-- . - .-. .- -. ... ..-. . .-. ·-·-·- -.-. --- -- -··-· -.. --- .-- -. .-.. --- .- -.. ... -··-· ..... . ..... -... ..... .---- ...-- -.-. --... ..-. ----. ..... . .- -.... -... -.. .- .- -.. --... .- .- ..--- -.-. -.-. ...-- -.. ---.. -... ----- ...-- ..--- ----- .---- ..... ----- ---.. ----- ...-- .---- ..--- ..--- ..... ..--- ....- -··-· ---.. ..--- -.. ...-- ----- -....

Titluri incluse:

802.1X Port-Based Authentication

A Technical Guide to IPSec Virtual Private Networks

Algebraic and Stochastic Coding Theory

Algebraic Curves in Cryptography

Algorithmic Cryptanalysis

An Introduction to Cryptography, Second Edition

Android Malware and Analysis

Android Security, Attacks and Defenses

Anonymous Communication Networks, Protecting Privacy on the Web

Building A Global Information Assurance Program

Critical Incident Management

Cyber Criminology

Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, First Ed

Cyber Forensics, A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Ed

Cyber Fraud, Tactics, Techniques and Procedures

Cyber Security Essentials

Cybervetting, Internet Searches for Vetting, Investigations, and Open-Source Intelligence, Second Edition

Data Governance, Creating Value from Information Assets

Data Mining and Machine Learning in Cybersecurity

Data Mining Tools for Malware Detection

Digital Forensics for Handheld Devices

Effective Surveillance for Homeland Security, Balancing Technology and Social Issues

Effective Use of Teams for IT Audits

End to End Adaptive Congestion Control in TCP-IP Networks

Information Security Fundamentals, Second Edition

Insider Computer Fraud, An In-depth Framework for Detecting and Defending against Insider IT Attacks

Java Programming for Engineers

Making IT Lean

Malicious Bots, An Inside Look into the Cyber-Criminal Underground of the Internet

Multilevel Modeling of Secure Systems in QoP-ML

Network Security Technologies

New Directions of Modern Cryptography

Noiseless Steganography - The Key to Covert Communications

Pearls of Discrete Mathematics

Practical Cryptography, Algorithms and Implementations Using C++

Practical Hacking Techniques and Countermeasures

Profiling Hackers

Security for Service Oriented Architectures

The Complete Book of Data Anonymization, From Planning to Implementation

Trade Secret Theft, Industrial Espionage, and the China Threat

  • Upvote 1
Link to post
Share on other sites
19 minutes ago, Jubasa said:

Imi poti oferii si mie, te rog, aceste carti?

 

Mechanics of User Identification and Authentication, Fundamentals of Identity Management and An Introduction to Cryptography, Second Edition

 

tks

 

Sorry, dar accesul meu la respectivul catalog online mi-a fost modificat. Am pierdut accesul la unele resurse electronice si am capatat acces la altele. Asta din pacate este unul din titlurile la care nu mai am acces.

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...