Advanced Computer Networking Book

Advanced Computer Networking Book | Persian

Description : An interconnection of multiple devices, also known as hosts, that are connected using multiple paths for the purpose of sending/receiving data or media. Computer networks can also include multiple devices/mediums which help in the communication between two different devices; these are known as Network devices and include things such as routers, switches, hubs, and bridges. … Read more

Free CV Templates | Download Free CV Templates

Free CV Templates | Download Free CV Templates

A CV, short form of curriculum vitae, is similar to a resume. It is a written summary of your academic qualifications, skill sets and previous work experience which you submit while applying for a job. Building an attractive CV helps in increasing your chances of getting the job. Resume Templates can be useful in building … Read more

An effective communication way in cyberspace

An effective communication way in cyberspace

Description : Social Media are interactive computer-mediated technologies that facilitate the creation or sharing of information, ideas, career interests and other forms of expression via virtual communities and networks. Social media is computer-based technology that facilitates the sharing of ideas, thoughts, and information through the building of virtual networks and communities. By design, social media is internet-based and gives users … Read more

TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY

TOR DARKNET BUNDLE (5 in 1) Master the ART OF INVISIBILITY: Bitcoins, Hacking, Kali Linux

Description : Want to surf the web anonymously? Cloak yourself in shadow? I will show you how to become a ghost in the machine – leaving no tracks back to your ISP. This book covers it all! Encrypting your files, securing your PC, masking your online footsteps with Tor browser, VPNs, Freenet and Bitcoins, and … Read more

How to Get a TLD For Free Using this Ultimate method _ 2020.png

How to get free TLD Domain (.com, .net, .org) | New method

Several companies such as Bluehost, SiteGround, Namecheap and etc will give you a free domain name, as they profit from you indirectly. For example, They give domain names to customers who host their websites with them. The cost of the domain name is then recouped from the hosting fee. So, Is it possible to get … Read more

All JavaScript in one book | Full JavaScript book

All JavaScript in one book | Full JavaScript book

Description : JavaScript (JS) is a lightweight, interpreted, or just-in-time compiled programming language with first-class functions. While it is most well-known as the scripting language for Web pages, many non-browser environments also use it, such as Node.js, Apache CouchDB and Adobe Acrobat. JavaScript is a prototype-based, multi-paradigm, single-threaded, dynamic language, supporting object-oriented, imperative, and declarative … Read more

Solving Python problems (solve 650 Programs) | Persian

Solving Python problems (solve 650 Programs) | Persian

Description : Python is a general-purpose interpreted, interactive, object-oriented, and high-level programming language. It was created by Guido van Rossum during 1985- 1990. Like Perl, Python source code is also available under the GNU General Public License (GPL). Python 3.0, released in 2008, was a major revision of the language that is not completely backward-compatible, and much … Read more

Kali Linux book | 2020

Kali Linux book | 2020

Description : Kali Linux is a Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing. Kali Linux contains several hundred tools which are geared towards various information security tasks, such as Penetration Testing, Security research, Computer Forensics and Reverse Engineering. Kali Linux is developed, funded and maintained by Offensive Security, a leading information security training company. Advantages: It has 600+ … Read more

Information Security: From the beginning to the present | Persian

Information Security: From the beginning to the present | Persian

Description : Information security refers to the processes and methodologies which are designed and implemented to protect print, electronic, or any other form of confidential, private and sensitive information or data from unauthorized access, use, misuse, disclosure, destruction, modification, or disruption. Information Security is not only about securing information from unauthorized access. Information Security is basically the practice of … Read more