Académique Documents
Professionnel Documents
Culture Documents
:
* ) Beginner (
R R R R R R R
Intermediate (
* )
R R R R R R
* ) Advanced (
R R R R
( Beginner
)
Mathematics :
:*
- Arithmetic
- Pre-Algebra
- Algebra I
- Geometry
- Algebra II
- Trigonometry
- Probability & Statistics
* :
-
MyOpenMath
Coursera
CK-12 Foundation
Art of Problem Solving (AoPS)
Computer Science :
:Programming )(
Python 3 /1/
:*
C ANSI /2/
:*
:*
Computer Organization )(
Networks )(
- Computer Networks
- Computer Networks, Tanenbaum
:*
:*
)
( Intermediate
Mathematics :
:*
Pre-Calculus
Differential Calculus
Integral Calculus
Multivariable Calculus
Differential Equations
Linear Algebra
Introduction to Logic
Intermediate Algebra
Pre-Calculus
Calculus: Single Variable
Calculus One
Calculus Two: Sequences and Series
MyOpenMath
Coursera
CK-12 Foundation
Art of Problem Solving (AoPS)
:*
:*
Computer Science :
Computer Architecture )(
- Computer Architecture
- Computer Architecture: A Quantitative Approach
* :
:*
Microprocessor Design /*
-
:*
:*
*/ Mac OS X
- Mac OS X and iOS Internals: To the Apples Core
*/ Linux
- Understanding the Linux Kernel
- Linux Kernel Development
:Programming )(
C++ ISO /3/
:*
- C++ Without Fear: A Beginners Guide That Makes You Feel Smart
- The C++ Programming Language
- The C++ Standard Library: A Tutorial and Reference
-
:*
C++ Primer
C++ Primer Plus
Programming: Principles and Practice Using C++
C++ Concurrency in Action: Practical Multithreading
Assembly /4/
Intel x86 & _64 :*
-
:*
:*
)
( Advanced
Information Security
R R R R R R R R R R R R R R R:
R R R R R R R R R R R R R R R R R
Reverse Engineering
- Reversing: Secrets of Reverse Engineering
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and
Obfuscation
Software Security
Reverse REngineering R:
Software Security :
Database Security
Solid Rbackground Rin RDatabases R:
Malware: Analysis
Network Security, Software Security :
Malicious Software and its Underground Economy: Two Sides to Every Story :
Network Security
Network Packet , Flow , Monitoring , Protocols , Wireless , Cloud :
- Practical Packet Analysis
- Network Flow Analysis
- The Practice of Network Security Monitoring: Understanding Incident Detection and
Response
- Applied Network Security Monitoring: Collection, Detection, and Analysis
- Hacking VoIP: Protocols, Attacks, and Countermeasures
- Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
- Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions
- Wireless Network Security A Beginners Guide
- Hacking Exposed: Wireless Security Secrets & Colutions
- Hacking Exposed: Network Security Secrets & Solutions
- Network and System Security
- Network Security Essentials Applications and Standards
- Securing the Cloud: Cloud Computer Security Techniques and Tactics
Cryptology
Solid background in Mathematics, Software Security, Network Security :
Cryptography, Cryptanalysis :
:
Number Rtheory R R
Information Rtheory R R
Complexity Rtheory R R
Group Rtheory R R
Probability Rtheory R R
Abstract Ralgebra R R
Combinatorics R R
-
Social Engineering
Penetration Testing
:
Digital Forensics
:
- The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
- Digital Forensics with Open Source Tools
- Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO
17025, ISO 27001 and Best Practice Requirements
- Computer Forensics InfoSec Pro Guide
- An Excerpt from Malware Forensic Field Guide for Linux Systems Larger Cover Linux
Malware Incident Response: A Practitioners Guide to Forensic Collection and Examination
of Volatile Data
- Malware Forensics Field Guide for Windows Systems: Digital Forensics Field Guides
- Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 8
- Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
- Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
- Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative
Techniques to Identify Cybercrime Suspects
- Digital Forensics for Legal Professionals: Understanding Digital Evidence From The
Warrant To The Courtroom
- Real Digital Forensics: Computer Security and Incident Response
- Network Forensics: Tracking Hackers through Cyberspace
- File System Forensic Analysis
- Cloud Storage Forensics
- Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual
Environments
- iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone,
iPad and iOS Devices
- iOS Forensic Analysis: for iPhone, iPad, and iPod touch
- XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
- Android Forensics: Investigation, Analysis and Mobile Security for Google Android
- X-Ways Forensics Practitioners Guide
Mobile Security
Mobile OS: Android or IPhone, Programming: Java or Objective-C, Software :
Security
:
Hardware Security
- Hardware Security
- Introduction to Hardware Security and Trust
- Computer Architecture and Security: Fundamentals of Designing Secure Computer
Systems
:
:
OS Security
- The Mac Hackers Handbook
- The Hackers Guide to OS X: Exploiting OS X from the Root Up
- A Guide to Kernel Exploitation: Attacking the Core