Nonfiction » Computers and Internet » Networking / security

How Hackers Break into Your Facebook and Network – And How to Protect Yourself
Price: Free! Words: 3,470. Language: English. Published: October 28, 2017. Categories: Nonfiction » Computers and Internet » Networking / security
Your business, computers, and website work 24 hours a day, even when the business doors are locked. Hackers also work around the clock and attack large and small businesses. Any information stored on the network or on a magnetic device is exposed to theft from a distance. Physical presence is not required.
How to Hack Like a GOD
Price: $6.99 USD. Words: 22,250. Language: English. Published: September 1, 2017. Categories: Nonfiction » Computers and Internet » Networking / security, Nonfiction » Computers and Internet » Security / viruses
Whether you are a wannabe pentester dreaming about real-life hacking experiences or an experienced ethical hacker tired of countless Metasploit tutorials, you will find unique gems in this book for you to try.
How to Hack Like a Pornstar
Price: $6.99 USD. Words: 23,780. Language: English. Published: September 1, 2017. Categories: Nonfiction » Computers and Internet » Security / viruses, Nonfiction » Computers and Internet » Networking / security
We will set up a fake – but realistic enough – target and go in detail over the main steps to hack the company: building phishing malware, finding vulnerabilities, rooting Windows domains, pwning a mainframe, etc.
For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
Price: $6.99 USD. Words: 37,560. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Networking / security
This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force.
Hackercool Emagazine
Price: $1.99 USD. Words: 5,170. Language: English (Indian dialect). Published: September 7, 2016. Categories: Nonfiction » Computers and Internet » Networking / security
This is the zeroeth edition of Hackercool monthly magazine which intends to teach ethical hacking to absolute beginners.
Hacking: Intrusion Detection & Penetration - A Beginners Guide
Price: $9.95 USD. Words: 30,320. Language: English. Published: September 4, 2016. Categories: Nonfiction » Computers and Internet » Networking / security
One of the great mysteries in computer security management is the modus operandi of criminal hackers. If you don't know how they can attack you, how can you protect yourself from them? Prepare to be enlightened. This ebook is not intended to show criminal hackers how to break computer systems and networks, but rather to show how attackers can take advantage of your mistakes.
Software Security For You
Price: Free! Words: 22,490. Language: English. Published: October 23, 2015. Categories: Nonfiction » Computers and Internet » Internet / security, Nonfiction » Computers and Internet » Networking / security
This book is an attempt to educate people on software security with my 10 years experience in security industry.
The DIY Guide to Home Wi-Fi
Price: $9.95 USD. Words: 9,910. Language: Canadian English. Published: June 17, 2015. Categories: Nonfiction » Computers and Internet » Networking / security
You should be able to fix your wi-fi. You can fix this yourself. You know that after speaking with the cable/ISP representative for 45 seconds the problem will be fixed. You shouldn’t need to go thought all of that to fix your service. Millions of people have this problem. After today you don’t be, It will be the last time you have to deal with the aforementioned problem.
Ethical Hacking and Computer Securities For Beginners
Price: $7.00 USD. Words: 7,080. Language: English. Published: January 25, 2015. Categories: Nonfiction » Computers and Internet » Networking / security
This book is written based on practical usage and research on computer security and networks. Basically everyone has strong concern about computer security networks where by it can sabotage the business and operations. It will be worse if the entire business operations are running on the website or web hosting company.
OpenVPN Formula Advanced Installation
Price: $15.99 USD. Words: 5,680. Language: English. Published: September 27, 2014. Categories: Nonfiction » Computers and Internet » Client-server computing, Nonfiction » Computers and Internet » Networking / security
Features: Openvpn Installation (Power Installation like business for company) Client Control VPS Server type Installation With user admin client Openvpn server status Connection from reject IP Phpmyadmin safety(Hide) and many more....
Démarrer avec OpenBSD
Price: $4.99 USD. Words: 3,950. Language: French. Published: June 17, 2014. Categories: Nonfiction » Computers and Internet » Operating systems, Nonfiction » Computers and Internet » Networking / security
L'essentiel pour une prise en main rapide d'un système OpenBSD 5.8.
DNSSEC Mastery: Securing the Domain Name System with BIND
Price: $9.99 USD. Words: 32,840. Language: English. Published: April 16, 2013 by Tilted Windmill Press. Categories: Nonfiction » Computers and Internet » Internet / security, Nonfiction » Computers and Internet » Networking / security
DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century.
SELinux For Beginners
Price: $5.99 USD. Words: 4,840. Language: English. Published: September 1, 2012. Categories: Nonfiction » Computers and Internet » Networking / security
SELinux is an Access control mechanism available in *nix based operating systems like – Various Linux Distribution and BSD platforms. Using SELinux, the system administrator/root user can define various rules to control the access of different applications runs on the operating system.