Nonfiction » Computers and Internet » Security

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
By
Price: $9.99 USD. Words: 36,320. Language: English. Published: January 19, 2012 by Tilted Windmill Press. Category: Nonfiction » Computers and Internet » System administration / general
(4.63 from 8 reviews)
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job. This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. Master SSH with SSH Mastery.
Keyword Filter Testing Manual
By
Price: Free! Words: 1,980. Language: American English. Published: November 7, 2010. Category: Nonfiction » Computers and Internet » Security
Ironically, the standard way to test web content filters is to to attempt to visit the very websites one desires to block. This ebook will show you an alternative method of checking your keyword filter …
OWNED: Why hacking continues to be a problem
By
Price: $9.99 USD. Words: 32,260. Language: English. Published: May 8, 2010. Category: Nonfiction » Computers and Internet » Security
Unlike what most people are led to believe, the hacking problem is not just about hackers and security vulnerabilities. Get an insider’s perspective on computer security and hacking, to learn some of the hidden reasons why hackers have an advantage over their security counterparts. Can the world ever be free of hackers given today’s technology? The answer to this question may surprise you.
Unmasked
By
Price: $1.99 USD. Words: 25,410. Language: English. Published: March 9, 2011. Category: Nonfiction » Politics and Current Affairs » Activism
How the Internet vigilantes of Anonymous took on a computer security firm, spilled its secrets to the world, and got the attention of Congress--all to keep their own identities a secret.
Operationalizing Information Security - Putting the Top 10 SIEM Best Practices to Work
By
Price: $9.99 USD. Words: 12,200. Language: English. Published: December 25, 2010. Category: Nonfiction » Computers and Internet » Security
Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate compliance processes, better manage security and operational risk, or build out deployments, examine key process, metrics and technology considerations.
Professional Help: How to Prevent and Fix Malware, Viruses, Spyware and Other Baddies
By
Price: $2.99 USD. Words: 3,730. Language: English. Published: December 24, 2010. Category: Nonfiction » Computers and Internet » Security
(4.00 from 1 review)
Are you tired of malware sloiwing your computer down? Are you sick of toolbars and popups? Do you know what to do if a virus strikes? Get Professional Help! I have worked on computers professionally since 2002, and these are the exact same steps and software that I use to prevent infections and clean infected systems. Now instead of tracking down the local guru, you can fix it yourself!
Active Regulation: General Systems Design Principles
By
Series: Systems Thinking, Book 3. Price: $9.99 USD. Words: 65,680. Language: English. Published: June 6, 2011. Category: Nonfiction » Computers and Internet » Security
Active Regulation is Volume 3 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" The second and third books tackle the next question, namely "Why do things stay the same?
Sudo Mastery: User Access Control for Real People
By
Price: $9.99 USD. Words: 33,830. Language: English. Published: October 29, 2013 by Tilted Windmill Press. Category: Nonfiction » Computers and Internet » Security
Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. Sudo lets you divide root’s monolithic power between the people who need it, with accountability and auditability. While many people use sudo, most use only a small part of it’s features. Master sudo with Sudo Mastery.
Passive Regulation: General Systems Design Principles
By
Series: Systems Thinking, Book 2. Price: $9.99 USD. Words: 61,070. Language: English. Published: June 3, 2011. Category: Nonfiction » Computers and Internet » Security
Passive Regulation is Volume 2 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" This second books tackles the next question, namely "Why do things stay the same?"
Hackonomics 2010
By
Price: $9.95 USD. Words: 17,620. Language: English. Published: September 6, 2010. Category: Nonfiction » Computers and Internet » Security
If you browse the web and read e-mail in 2010, then this book is for you. Inside, you may find information about what technologies hackers use, how they work, what kinds of hackers there are, how much things cost, and some simple security techniques. This information should help you be more secure on the Internet by raising your awareness.
Email Security in Persian Language
By
Price: Free! Words: 24,770. Language: Persian. Published: February 19, 2014. Category: Nonfiction » Computers and Internet » Security
درباره این کتاب: این کتاب به مسئله امنیت پست الکترونیکی می‌پردازد. ابتدا مفاهیم پست الکترونیکی و نحوه عملکرد پست الکترون‌یکی را خواهیم آموخت. در ادامه مخاطرات پست الکترونیکی، معرفی شده و به نحوه ایمن سازی آنها اشاره خواهیم کرد. از ویژگی‌های مهم این کتاب، ارائه روشی نوین برای ارزیابی مخاطرات پست الکترونیکی و همچنین، ایمن سازی مخاطرات پست الکترونیکی، بر اساس نوع سازمان می‌باشد. بر اساس این کتاب، مقا
Ensuring Information Assets Protection
By
Price: $36.24 USD. Words: 35,010. Language: English. Published: February 14, 2011. Category: Nonfiction » Computers and Internet » Security
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics.
Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)
By
Price: $4.99 USD. Words: 15,700. Language: English. Published: February 8, 2011. Category: Nonfiction » Computers and Internet » Security
How to protect yourself and your family from identity theft, loss of personal and private information and other types of cyber-threats.
SAP Security Interview Questions, Answers, and Explanations
By
Price: $9.99 USD. Words: 18,450. Language: English. Published: October 3, 2011. Category: Nonfiction » Computers and Internet » Security
SAP Security Interview Questions, Answers and Explanations Includes: *Finding Audit Critical Combinations *Authentication, Transaction Logging, and Passwords *Roles, Profiles, and User Management *ITAR, DCAA, DCMA, and Audit Requirements *The most important security settings to know *Security Tuning, Tips & Tricks, and FAQ *SAP Authorization Concept
IT Auditing: Assuring Information Assets Protection
By
Series: IT Auditing, Book 2. Price: $59.95 USD. Words: 75,740. Language: English. Published: March 17, 2012. Category: Nonfiction » Computers and Internet » Security
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques.
Assuring Information Security
By
Series: Assurance Services, Book 3. Price: $24.95 USD. Words: 15,130. Language: English. Published: June 30, 2012. Category: Nonfiction » Computers and Internet » Security
“Assuring Information Security” was written with the intent to create quality quick reference material for assurance service practitioners to enable addressing protection mandates.
A Simple RFID Implementation
By
Price: $12.00 USD. Words: 10,090. Language: English. Published: February 15, 2011. Category: Nonfiction » Computers and Internet » Security
Radio Frequency Identification is an automatic identification method, relying on storing and remotely receiving data using devices called RFID tags. It uses the technology that incorporates the use of electromagnetic coupling in the Radio Frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, which is attached with a RFID tag. Some tags can be read from several mete
How To Protect Your Personal Computer - Your Step-By-Step Guide To Fight Spyware, Viruses, & Malware
By
Price: $9.99 USD. Words: 5,160. Language: English. Published: April 3, 2011. Category: Nonfiction » Computers and Internet » Security
- Learn how to protect your PC. - Get tips on how to password protect your files and folders. - Discover how to activate windows defender. - Learn how to employ a firewall. - Learn how to adjust security settings depending on your browser. - Learn how to perform internet browsing and downloading carefully. - Get techniques on how to employ CCleaner to eradicate malware - Discover Free software
How to Manage Your Computer Like a Security Expert for Free
By
Price: $9.99 USD. Words: 14,610. Language: English. Published: August 3, 2011. Category: Nonfiction » Computers and Internet » Security
A condensed yet straight-forward eBook that guides you from the basic to some of the most advanced techniques for computer security, both for offline and online use.
A Simple Guide to Virus Removal
By
Price: $1.99 USD. Words: 6,550. Language: English. Published: May 18, 2011. Category: Nonfiction » Computers and Internet » Security
A step by step guide to performing virus and Malware removal that computer repair technicians perform on a day to day basis charging between $50-$200 per job. You will be surprised at how easy it is. 1.Introduction 2.Virus Removal Guide 3.What are viruses? Why do they exist? 4.How to Prevent and Avoid Viruses 5."extra" Installing Windows XP/Vista/7 6. How to use the Software step by step