Nonfiction » Computers and Internet » Security

Scamming Exposed
By
Price: $60.00 USD. Words: 153,930. Language: English. Published: January 17, 2012. Category: Nonfiction » Computers and Internet » Security
This book a chronicle of the activities, tricks of internet scammers to serve as warnings and danger signals to would be victims of this costly cyber business. This book has successfully exposed the tricks behind scamming and the nefarious activities of those behind this multibillion dollar internet business deal.The author strikes an important note to victims and would be victims of cyber fraud.
How Not To Use Your Smartphone
By
Price: $2.99 USD. Words: 29,740. Language: English. Published: January 2, 2012. Category: Nonfiction » Computers and Internet » Security
Identity thieves can do an awful lot of bad once they have your personal information. In this book, computer security expert Rod Cambridge exposes the dangers of getting hacked and being made a victim of identity theft through your smartphone. Rod also provides practical solutions, tips, and advice to help stop the bad guys making you a victim of various types of fraud all through your phone.
Identity Theft Today And The Internet
By
Price: $2.49 USD. Words: 37,820. Language: English. Published: November 1, 2011. Category: Nonfiction » Computers and Internet » Security
Identity theft and the Internet are more pervasive today than ever. Learning how to avoid identity theft and recognize the different forms of it are critical.
Speeding Up Windows 7
By
Price: $4.99 USD. Words: 1,550. Language: English. Published: October 31, 2011. Category: Nonfiction » Computers and Internet » Security
We created the Speeding up Windows 7 report to help users stop or prevent slow computer syndrome that is known to come with computers. We have all had our computer slow down for some reason or another and not necessarily know exactly how to fix that.This report is not just going to say download some registry cleaner to speedup Windows 7 but give comprehensive instructions on how to optimize a pc
Hacked!
By
Price: $0.99 USD. Words: 3,070. Language: English. Published: October 14, 2011. Category: Nonfiction » Computers and Internet » Security
It is what we all dread - having our accounts hacked and identities stolen. It happened to me recently and I was surprised by the stupidity of the hacker, the complete disinterest of the large companies with whom I have accounts, and how vulnerable we are. This short ebook outlines my journey, hopefully it might provide you with some tips to avoid suffering the same fate.
SAP Security Interview Questions, Answers, and Explanations
By
Price: $9.99 USD. Words: 18,450. Language: English. Published: October 3, 2011. Category: Nonfiction » Computers and Internet » Security
SAP Security Interview Questions, Answers and Explanations Includes: *Finding Audit Critical Combinations *Authentication, Transaction Logging, and Passwords *Roles, Profiles, and User Management *ITAR, DCAA, DCMA, and Audit Requirements *The most important security settings to know *Security Tuning, Tips & Tricks, and FAQ *SAP Authorization Concept
Personal Encryption
By
Price: $0.99 USD. Words: 2,840. Language: English. Published: September 4, 2011. Category: Nonfiction » Computers and Internet » Security
Take control of your personal data. Stop writing passwords and important information on slips of paper and the backs of napkins. Start today with Book One in our Foundations Series. Create a virtual computer with it's own virtual office using Open Source Software and the latest in data encryption. Let Spicer Solutions LLC show you the Secret.
How to Manage Your Computer Like a Security Expert for Free
By
Price: $9.99 USD. Words: 14,610. Language: English. Published: August 3, 2011. Category: Nonfiction » Computers and Internet » Security
A condensed yet straight-forward eBook that guides you from the basic to some of the most advanced techniques for computer security, both for offline and online use.
Active Regulation: General Systems Design Principles
By
Series: Systems Thinking, Book 3. Price: $9.99 USD. Words: 65,680. Language: English. Published: June 6, 2011. Category: Nonfiction » Computers and Internet » Security
Active Regulation is Volume 3 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" The second and third books tackle the next question, namely "Why do things stay the same?
Passive Regulation: General Systems Design Principles
By
Series: Systems Thinking, Book 2. Price: $9.99 USD. Words: 61,070. Language: English. Published: June 3, 2011. Category: Nonfiction » Computers and Internet » Security
Passive Regulation is Volume 2 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" This second books tackles the next question, namely "Why do things stay the same?"
A Simple Guide to Virus Removal
By
Price: $1.99 USD. Words: 6,550. Language: English. Published: May 18, 2011. Category: Nonfiction » Computers and Internet » Security
A step by step guide to performing virus and Malware removal that computer repair technicians perform on a day to day basis charging between $50-$200 per job. You will be surprised at how easy it is. 1.Introduction 2.Virus Removal Guide 3.What are viruses? Why do they exist? 4.How to Prevent and Avoid Viruses 5."extra" Installing Windows XP/Vista/7 6. How to use the Software step by step
Cyberspace Cybersecurity: First American International Strategy for Cyberspace, White House and GAO Reports and Documents, Internet Data Security Protection, International Web Standards
By
Price: $9.99 USD. Words: 61,100. Language: English. Published: May 18, 2011. Category: Nonfiction » Politics and Current Affairs » Current affairs
On May 16, 2011, the White House announced what it called the United States’ first comprehensive International Strategy for Cyberspace. This impressive compilation has over 200 pages of official government reports and documents, including the complete White House cyberspace strategy document and supporting materials and much more.
Consumer Guide to Computer Security: Fight Back Against Identity Theft, Malware, Hackers, Spyware, Spam, Botnets, Phishing - Online Privacy - Wireless, Laptop, Hotspot Security
By
Price: $9.99 USD. Words: 165,120. Language: English. Published: May 16, 2011. Category: Nonfiction » Computers and Internet » Security
Information for consumers includes fighting back against identity theft, how identity theft occurs, procedures to follow for victims, email scams, botnets, hackers and spam, health online, home wireless security, identity theft, internet auctions, kids' privacy, laptop security, malware, online shopping, P2P security, phishing, spyware, tax-related id theft, voip, wi-fi hotspots, and more.
2011 Guide to Data Security and Mobile Privacy Issues: Data Theft Hearings and FTC Reports, Online Threats, Identity Theft, Phishing, Internet Security, Malware, Cyber Crime
By
Price: $9.99 USD. Words: 165,250. Language: English. Published: May 16, 2011. Category: Nonfiction » Computers and Internet » Security
Comprehensive coverage of all aspects of data security and mobile privacy issues, including the prevention of data theft. This impressive compilation has over 500 pages of official government reports and documents, including testimony at hearing held on these vital matters.
How To Protect Your Personal Computer - Your Step-By-Step Guide To Fight Spyware, Viruses, & Malware
By
Price: $9.99 USD. Words: 5,160. Language: English. Published: April 3, 2011. Category: Nonfiction » Computers and Internet » Security
- Learn how to protect your PC. - Get tips on how to password protect your files and folders. - Discover how to activate windows defender. - Learn how to employ a firewall. - Learn how to adjust security settings depending on your browser. - Learn how to perform internet browsing and downloading carefully. - Get techniques on how to employ CCleaner to eradicate malware - Discover Free software
Unmasked
By
Price: $1.99 USD. Words: 25,410. Language: English. Published: March 9, 2011. Category: Nonfiction » Politics and Current Affairs » Activism
How the Internet vigilantes of Anonymous took on a computer security firm, spilled its secrets to the world, and got the attention of Congress--all to keep their own identities a secret.
A Simple RFID Implementation
By
Price: $12.00 USD. Words: 10,090. Language: English. Published: February 15, 2011. Category: Nonfiction » Computers and Internet » Security
Radio Frequency Identification is an automatic identification method, relying on storing and remotely receiving data using devices called RFID tags. It uses the technology that incorporates the use of electromagnetic coupling in the Radio Frequency (RF) portion of the electromagnetic spectrum to uniquely identify an object, which is attached with a RFID tag. Some tags can be read from several mete
Ensuring Information Assets Protection
By
Price: $36.24 USD. Words: 35,010. Language: English. Published: February 14, 2011. Category: Nonfiction » Computers and Internet » Security
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics.
Avoiding Information Insecurity: Fighting Modern Day Cyber-Threats (2011 Edition)
By
Price: $4.99 USD. Words: 15,700. Language: English. Published: February 8, 2011. Category: Nonfiction » Computers and Internet » Security
How to protect yourself and your family from identity theft, loss of personal and private information and other types of cyber-threats.
Operationalizing Information Security - Putting the Top 10 SIEM Best Practices to Work
By
Price: $9.99 USD. Words: 12,200. Language: English. Published: December 25, 2010. Category: Nonfiction » Computers and Internet » Security
Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate compliance processes, better manage security and operational risk, or build out deployments, examine key process, metrics and technology considerations.