Risk, Participation, and Performance Practice: Critical Vulnerabilities in a Precarious World

Risk, Participation, and Performance Practice: Critical Vulnerabilities in a Precarious World

Risk, Participation, and Performance Practice: Critical Vulnerabilities in a Precarious World By Alice O'Grady
English | PDF,EPUB | 2017 | 277 Pages | ISBN : 3319632418 | 5.85 MB
This book explores a range of contemporary performance practices that engage spectators physically and emotionally through active engagement and critical involvement. It considers how risk has been re-configured, re-presented and re-packaged for new audiences with a thirst for performances that promote, encourage and embrace risky encounters in a variety of forms.
Download Now

Web Security: Common Vulnerabilities And Their Mitigation Video by Loonycorn

Web Security: Common Vulnerabilities And Their Mitigation Video by Loonycorn
Web Security: Common Vulnerabilities And Their Mitigation Video by Loonycorn
MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 8 Hours | 16.7 GB
Genre: eLearning | Language: English

Coat your website with armor, protect yourself against the most common threats and vulnerabilities. Understand, with examples, how common security attacks work and how to mitigate them.
Download Now

Web Security - Common Vulnerabilities And Their Mitigation

Web Security - Common Vulnerabilities And Their Mitigation
Web Security - Common Vulnerabilities And Their Mitigation
MP4 | Video: AVC 1920x1080 | Audio: AAC 48KHz 2ch | Duration: 8 Hours | 16.7 GB
Genre: eLearning | Language: English

Download Now

CompTIA Security+ (SY0-401) Cert Prep Threats and Vulnerabilities


CompTIA Security+ (SY0-401) Cert Prep Threats and Vulnerabilities

CompTIA Security+ (SY0-401) Cert Prep: Threats and Vulnerabilities
MP4 | Video: 720p | Duration: 2:46:14 | English | Subtitles: VTT | 469.4 MB

Download Now

Packt Publishing - Finding and Exploiting Hidden Vulnerabilities

Packt Publishing - Finding and Exploiting Hidden Vulnerabilities

Packt Publishing - Finding and Exploiting Hidden Vulnerabilities
English | Size: 764.89 MB
Category: Tutorial

When learning about penetration testing, vulnerability assessments play an important role, followed by exploiting the vulnerabilities identified. Finally, everything needs to be documented properly to present to the client. This course focuses on all these elements of the VAPT activity.

Courses focused on teaching Vulnerability Assessment and Penetration Testing sometimes miss out on essential elements such as documentation. Keeping this in mind, the course module has been developed to help you understand the process of VAPT step by step. So here you'll learn how to perform vulnerability assessments using well-known softwares such as Nessus and OpenVas.
Download Now

Finding and Exploiting Hidden Vulnerabilities


Finding and Exploiting Hidden Vulnerabilities

Finding and Exploiting Hidden Vulnerabilities
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 763 MB
Genre: eLearning | Language: English

Download Now

Finding and Exploiting Hidden VulnerabilitiesFinding and Exploiting Hidden Vulnerabilities

Finding and Exploiting Hidden VulnerabilitiesFinding and Exploiting Hidden Vulnerabilities
Finding and Exploiting Hidden VulnerabilitiesFinding and Exploiting Hidden Vulnerabilities
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 2.5 Hours | 763 MB
Genre: eLearning | Language: English

Download Now

Security+ Certification - Threats and Vulnerabilities Domain

Security+ Certification - Threats and Vulnerabilities Domain
Security+ Certification - Threats and Vulnerabilities Domain
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3 Hours | Lec: 20 | 927 MB
Genre: eLearning | Language: English

Download Now

Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks

Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks

Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks by Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz and John Grin
English | 2011 | ISBN: 3642177751 | 1866 pages | PDF | 171 MB
Download Now

Prioritization Theory and Defensive Foreign Policy: Systemic Vulnerabilities in International Politics

Prioritization Theory and Defensive Foreign Policy: Systemic Vulnerabilities in International Politics

Prioritization Theory and Defensive Foreign Policy: Systemic Vulnerabilities in International Politics by Hanna Samir Kassab
2017 | ISBN: 3319480170 | English | 255 pages | PDF | 2 MB
Download Now