Nonfiction » Computers and Internet » Security

Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism
By
Price: $1.99 USD. Words: 51,560. Language: English. Published: October 6, 2014. Category: Nonfiction » Computers and Internet » Security
This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains.
Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities
By
Price: $8.99 USD. Words: 122,250. Language: English. Published: August 22, 2014. Category: Nonfiction » Computers and Internet » Security
This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it.
Cyber Security Planning Guide, Small Business Information Security Fundamentals - Privacy and Data Security, Scams and Fraud, Network Security, Website Security, Email, Mobile Devices, Employees
By
Price: $6.99 USD. Words: 69,900. Language: English. Published: August 15, 2014. Category: Nonfiction » Business & Economics » Small business and entrepreneurship
This ebook reproduces two government documents with authoritative information for small businesses on cyber security and information security: Cyber Security Planning Guide and Small Business Information Security: The Fundamentals.
10 Things That Used to be Good Ideas in Data Security
By
Price: $5.99 USD. Words: 25,520. Language: English. Published: July 30, 2014. Category: Nonfiction » Computers and Internet » Security
In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change.
The Book on Healthcare IT: What you need to know about HIPAA, Hospital IT, and Healthcare Information Technology
By
Price: $5.99 USD. Words: 25,330. Language: English. Published: June 25, 2014. Category: Nonfiction » Computers and Internet » Security
This book covers the hot topics such as: options for encryption of personal health information, best ways to protect patient privacy, HIPAA requirements and compliance, prevention of fraud by healthcare insiders, wireless network security do’s and don’ts and even a section on what we can learn from the Catholic Health System’s network and data security.
Beginner's Guide for Cybercrime Investigators
By
Price: $2.99 USD. Words: 30,100. Language: English. Published: June 17, 2014. Category: Nonfiction » Computers and Internet » Security
Cybercrime is a phenomenon of our time, often reflected in the media. Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. The computer itself is the main source of information for the investigator.
U.S. Army War College Information Operations Primer - Fundamentals of Information Operations - Botnet, Stuxnet, Cyber Warfare, NSA, Service Organizations
By
Price: $7.99 USD. Words: 61,440. Language: English. Published: May 9, 2014. Category: Nonfiction » Computers and Internet » Security
This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels.
Big Data: Seizing Opportunities, Preserving Values - Report of the Presidential Big Data and Privacy Working Group, Internet, Computer, Online Communications Privacy Threats
By
Price: $1.99 USD. Words: 34,650. Language: English. Published: May 2, 2014. Category: Nonfiction » Computers and Internet » Security
The review did not set out to answer every question about big data, nor was it intended to develop a comprehensive policy approach to big data. However, by evaluating the opportunities and challenges presented by big data, the working group was able to draw important conclusions and make concrete recommendations to the President for Administration attention and policy development.
Manualul investigatorului în criminalitatea informatică
By
Price: Free! Words: 43,680. Language: Romanian. Published: April 23, 2014. Category: Nonfiction » Computers and Internet » Security
Ghid introductiv pentru aplicarea dispozitiilor legale referitoare la criminalitatea informatica.
CEH (Certified Ethical Hacker) : 100% iLLEGAL
By
Price: $4.99 USD. Words: 33,080. Language: English. Published: April 21, 2014. Category: Nonfiction » Computers and Internet » Security
This is a Un-official CEH (Certifited Ethical hacker Guide) that cover CEH module with easy-to-follow
Cyberspace Operations: What Senior Leaders Need to Know About Cyberspace - EMP, Catastrophic Events, Carrington Event, plus Resilient Military Systems and the Advanced Cyber Threat
By
Price: $5.99 USD. Words: 46,330. Language: English. Published: April 9, 2014. Category: Nonfiction » Computers and Internet » Security
The Cyberspace Operations Group of the Center for Strategic Leadership, U.S. Army War College, conducted a three-day workshop to explore the cyberspace issues that should be addressed in senior service college-level education and similar senior leader education programs.
The Core Of Hacking
By
Price: $9.99 USD. Words: 40,610. Language: English. Published: March 19, 2014. Category: Nonfiction » Computers and Internet » Security
How to Become an Ethical Hacker & What will You get from This Book ? Hack any web mail accounts Yahoomail, Gmail. Hotmail; Hack Windows Administrator Password; Hack face book account; Learn how Phishing is done; Hack & Crack Wi-Fi (WLAN) Secured Network; Purchase any item through web based marketing site in just 1 USD; Learn How to secure your network, system and data; And many more things.......
Email Security in Persian Language
By
Price: Free! Words: 24,770. Language: Persian. Published: February 19, 2014. Category: Nonfiction » Computers and Internet » Security
درباره این کتاب: این کتاب به مسئله امنیت پست الکترونیکی می‌پردازد. ابتدا مفاهیم پست الکترونیکی و نحوه عملکرد پست الکترون‌یکی را خواهیم آموخت. در ادامه مخاطرات پست الکترونیکی، معرفی شده و به نحوه ایمن سازی آنها اشاره خواهیم کرد. از ویژگی‌های مهم این کتاب، ارائه روشی نوین برای ارزیابی مخاطرات پست الکترونیکی و همچنین، ایمن سازی مخاطرات پست الکترونیکی، بر اساس نوع سازمان می‌باشد. بر اساس این کتاب، مقا
Sudo Mastery: User Access Control for Real People
By
Price: $9.99 USD. Words: 33,830. Language: English. Published: October 29, 2013 by Tilted Windmill Press. Category: Nonfiction » Computers and Internet » Security
Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. Sudo lets you divide root’s monolithic power between the people who need it, with accountability and auditability. While many people use sudo, most use only a small part of it’s features. Master sudo with Sudo Mastery.
Identity Theft in the Cyber Age
By
Price: $5.99 USD. Words: 36,800. Language: English. Published: August 1, 2013. Category: Nonfiction » Business & Economics » Personal finance
This book, written by a well-known and extensively published computer scientist who has lectured and consulted for many years on identity theft, will show you how to avoid the most common mistakes consumers make in their everyday lives. The many illustrations and real-lfe examples will pay for this book a hundred-fold.
Military Cyber Attacks and America's Vulnerable Nuclear Weapons and Defenses: DoD Task Force Report on Resilient Military Systems and the Advanced Cyber Threat
By
Price: $9.99 USD. Words: 37,800. Language: English. Published: May 28, 2013. Category: Nonfiction » Computers and Internet » Security
This is a vital 2013 report from the U.S. Defense Department warning of serious cyber threats to the military, including the critical nuclear weapons infrastructure. The report addresses the risk of catastrophic cyber attacks and discusses the need for offensive operations.
IT Auditing: Assuring Information Assets Protection
By
Series: IT Auditing, Book 2. Price: $59.95 USD. Words: 75,740. Language: English. Published: March 17, 2012. Category: Nonfiction » Computers and Internet » Security
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques.
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
By
Price: $9.99 USD. Words: 36,320. Language: English. Published: January 19, 2012 by Tilted Windmill Press. Category: Nonfiction » Computers and Internet » System administration / general
(4.63 from 8 reviews)
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job. This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. Master SSH with SSH Mastery.
Scamming Exposed
By
Price: $60.00 USD. Words: 153,930. Language: English. Published: January 17, 2012. Category: Nonfiction » Computers and Internet » Security
This book a chronicle of the activities, tricks of internet scammers to serve as warnings and danger signals to would be victims of this costly cyber business. This book has successfully exposed the tricks behind scamming and the nefarious activities of those behind this multibillion dollar internet business deal.The author strikes an important note to victims and would be victims of cyber fraud.
How Not To Use Your Smartphone
By
Price: $2.99 USD. Words: 29,740. Language: English. Published: January 2, 2012. Category: Nonfiction » Computers and Internet » Security
Identity thieves can do an awful lot of bad once they have your personal information. In this book, computer security expert Rod Cambridge exposes the dangers of getting hacked and being made a victim of identity theft through your smartphone. Rod also provides practical solutions, tips, and advice to help stop the bad guys making you a victim of various types of fraud all through your phone.