Sadhguru Jaggi Vasudeva – Inner Engineering

Sadhguru Jaggi Vasudeva – Inner Engineering
English | Size: 9.66 GB
Category: Health / Fitness / Massage

Inner Engineering provides tools from the yogic science to empower you to create your life the way you want it. Designed by Sadhguru, a yogi and visionary.

Thanks to Shanegambler for the upload. [Read more…]

TTC – Do-it-Yourself Engineering

TTC – Do-it-Yourself Engineering
English | Size: 2.09 GB
Category: CBTs

Everyone appreciates a well-designed bridge, a sturdy skyscraper, or a flightworthy aircraft. But how many of us who aren’t engineers think, “I could build that”? In fact, you can. You may not have a professional engineer’s credentials, but you can tinker all you want in your own workshop, using readily available materials to build working models that solve all the fundamental problems of the real thing.
[Read more…]

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA

Ransomware: Practical Reverse Engineering | Malcolm Shore | LYNDA
English | Size: 201.63 MB
Category: Tutorial

Ransomware is a growing threat, and it’s imperative that IT security professionals have the knowledge and skills needed to protect their networks and systems against these attacks. In this course, instructor Malcolm Shore provides an in-depth look at tools and techniques you can use to reverse engineer malware. He discusses how to use reverse engineering to better understand malware, and demonstrates how to approach static and dynamic malware analysis. To wrap up, he dives into a real-world example of ransomware- the devastating WannaCry malware-using this case study to help you better understand how malware functions.
[Read more…]

[FLOTW] History Channel – Engineering an Empire (2006)

[FLOTW] History Channel – Engineering an Empire (2006)
English | Size: 4.78 GB
Category: Docu : History – Misc

Twenty-five hundred years before the reign of Julius Caesar, the ancient Egyptians were deftly harnessing the power of engineering on an unprecedented scale. Egyptian temples, fortresses, pyramids and palaces forever redefined the limits of architectural possibility. They also served as a warning to all of Egypt’s enemies-that the world’s most advanced civilization could accomplish anything. This two-hour special uses cinematic recreations and cutting-edge CGI to profile the greatest engineering achievements of ancient Egypt, and the pharaohs and architects who were behind them. Includes Djoser’s Step Pyramid at Saqqara, Senusret’s Nubian Superfortresses, Hatshepsut’s Mortuary Temple at Dier el-Bahari, Akhenaten’s city at Amarna, and the temples of Ramesses the Great at Abu Simbel. [Read more…]

Network Engineering ebooks Collection

Network Engineering ebooks Collection
English | Size: 129.78 MB
Category: Network

(Cisco Press networking technology series) Barry Raveendran Greene_ Philip Smith-Cisco ISP essentials-Cisco Press (2002)
(Network architecture and development series) Dr. Sidnie Feit-Local Area High Speed Networks-MTP (2000)
(The Morgan Kaufmann Series in Computer Architecture and Design) Mark A. Franklin, Patrick Crowley, Haldun Hadimioglu, Peter Z. Onufryk-Network Processor Design, Volume 3_ Issues and Practices-Morgan
(The Morgan Kaufmann Series in Networking) Adrian Farrel, Igor Bryskin-GMPLS_ Architecture and Applications-Morgan Kaufmann (2006)
(The Morgan Kaufmann series in networking) Bruce S. Davie, Adrian Farrel-MPLS _ next steps-Morgan-Kaufmann (2004)
(The Morgan Kaufmann Series in Networking) Deepankar Medhi, Karthikeyan Ramasamy-Network Routing_ Algorithms, Protocols, and Architectures-Morgan Kaufmann (2007)
[Read more…]

Pluralsight – Social Engineering with the Social-Engineer Toolkit

Pluralsight – Social Engineering with the Social-Engineer Toolkit
English | Size: 513.63 MB
Category: CBTs

The Social-Engineer Toolkit (SET) is an open-source Python-driven tool aimed at penetration testing around social engineering. Vulnerability scanners will find the security issues in computer systems, but cannot find them in a human being. If you want a good tool then SET is there to help you assess your company security cavity. In this course, Social Engineering with the Social-Engineer Toolkit, you’ll learn the social engineering attacks that SET supports. First, you’ll discover how the spear phishing attack works in SET in combination with an e-mail attack. Next, you’ll explore how to use the website attack vector, along with creating a payload and a listener. [Read more…]

MAGNITUDE ENGINEERING SOLUTIONS CATIA V5

MAGNITUDE ENGINEERING SOLUTIONS CATIA V5
English | Size: 1.91 GB
Category: Tutorial

Learn the basic and advanced features of Catia V5 step by step with the Catia V5 Tutorial DVD by Magnitude Engineering Solutions. The DVD plays instantly on your computer and comes with its own menu and media player so there is no instillation required. Just insert the DVD and choose what lesson you want from the menu. You’re able to play, pause, rewind or fast forward at anytime giving you the flexibility to learn at your own individual pace. These tutorials are made by industry professionals who will give you the tools to learn and master Catia V5 quickly and easily. This Catia V5 Tutorial is applicable to all versions of Catia V5 and comes with everything listed below. [Read more…]

Mathematics for Engineering

Mathematics for Engineering
English | Size: 492.53 MB
Category: Tutorial

Video and courseware for Mathematics for Engineering
[Read more…]

SANS FOR610 Reverse Engineering Malware

SANS FOR610 Reverse Engineering Malware
English | Size: 6.43 GB
Category: Tutorial

This malware analysis course prepares forensic investigators, incident responders, and malware specialists to reverse-engineer malicious software using practical tools and techniques.

This popular malware analysis course has helped forensic investigators, malware specialists, incident responders, and IT administrators assess malware threats. The course teaches a practical approach to examining malicious programs-spyware, bots, trojans, etc.-that target or run on Microsoft Windows. This training also looks at reversing Web-based malware, such as javascript and Flash files, as well as malicious document files. By the end of the course, you’ll learn how to reverse-engineer malicious software using a variety of system and network monitoring utilities, a disassembler, a debugger, and other tools for turning malware inside-out!
[Read more…]