Nonfiction » Computers and Internet » Security

Flying and Fighting in Cyberspace - Implications for Command and Control, Network Operations, and ISR, Threat Agent Profiles, Mapping of Enemy Systems and Data, Cyber Attack and Defense, Funding
Price: $5.99 USD. Words: 126,850. Language: English. Published: April 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain.
Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources
Price: $8.99 USD. Words: 161,510. Language: English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet / security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces five important military reports and studies dealing with cyberspace attacks and computer network security.
Flexible Options for Cyber Deterrence - Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment
Price: $5.99 USD. Words: 112,340. Language: English. Published: April 4, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain.
Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace - Characterizing the Asymmetric Threat, Hacking, Antisatellite Capabilities, Distributed Denial-of-Service (DDOS)
Price: $4.99 USD. Words: 108,060. Language: English. Published: March 31, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book discusses the realities of deterrence and retaliatory options to attacks in space and cyberspace.
Cyber War: The Next Frontier for NATO - Distributed Denial of Service (DDOS) Website Internet Attacks, Hacktivists, Hackers, Cyber Attacks, Cyber Terrorism, Tallinn Manual, Possible Responses
Price: $5.99 USD. Words: 118,440. Language: English. Published: March 27, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this unique study analyzes and explores the unique position that NATO operates in and the duty of NATO to protect its alliance members, and member states to protect each other.
Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis
Price: $6.99 USD. Words: 121,100. Language: English. Published: March 6, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Professionally converted for accurate flowing-text e-book format reproduction, this study examines how the U.S. government can follow a path to an effective cyberspace deterrence strategy by examining key periods in its past, countering the contemporary hypothesis that the unique nature of cyberspace alters warfare in such a way that historical approaches to deterrence no longer apply.
Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack (EMP), Countermeasures, Warfighter Cyber Security, Network Centric Warfare
Price: $6.99 USD. Words: 150,040. Language: English. Published: February 23, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this volume presents the results of a workshop bringing together leaders in the fields of military and commercial technology. The purpose of the meeting was to gain insight into the risks and vulnerabilities inherent in the use of information technology on the battlefield and in military systems.
Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities
Price: $8.99 USD. Words: 122,250. Language: English. Published: August 22, 2014. Categories: Nonfiction » Computers and Internet » Security
This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it.
Scamming Exposed
Price: $60.00 USD. Words: 153,930. Language: English. Published: January 17, 2012. Categories: Nonfiction » Computers and Internet » Security
This book a chronicle of the activities, tricks of internet scammers to serve as warnings and danger signals to would be victims of this costly cyber business. This book has successfully exposed the tricks behind scamming and the nefarious activities of those behind this multibillion dollar internet business deal.The author strikes an important note to victims and would be victims of cyber fraud.
Consumer Guide to Computer Security: Fight Back Against Identity Theft, Malware, Hackers, Spyware, Spam, Botnets, Phishing - Online Privacy - Wireless, Laptop, Hotspot Security
Price: $9.99 USD. Words: 165,120. Language: English. Published: May 16, 2011. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet
Information for consumers includes fighting back against identity theft, how identity theft occurs, procedures to follow for victims, email scams, botnets, hackers and spam, health online, home wireless security, identity theft, internet auctions, kids' privacy, laptop security, malware, online shopping, P2P security, phishing, spyware, tax-related id theft, voip, wi-fi hotspots, and more.
2011 Guide to Data Security and Mobile Privacy Issues: Data Theft Hearings and FTC Reports, Online Threats, Identity Theft, Phishing, Internet Security, Malware, Cyber Crime
Price: $9.99 USD. Words: 165,250. Language: English. Published: May 16, 2011. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet
Comprehensive coverage of all aspects of data security and mobile privacy issues, including the prevention of data theft. This impressive compilation has over 500 pages of official government reports and documents, including testimony at hearing held on these vital matters.