Welcome to Smashwords!

Check out our new interface for discovering great ebooks! Read the official announcement at the Smashwords Blog.

Please confirm your erotica preferences.

Learn more about erotica controls. You may change these settings at any time.

[Close]

Nonfiction » Computers and Internet » Internet / security

Hacking: Ultimate Beginners Guide to Computer Hacking: Wireless Hacking, Linux, Penetration Testing, Security, Types of Hacking (White, Black, Gray, Red, and Others)
Price: $2.99 USD. Words: 7,630. Language: English. Published: January 4, 2018 by Reader's Choice Club. Categories: Nonfiction » Computers and Internet » Internet / security, Nonfiction » Computers and Internet » Microprocessors
So you want to be a hacker? I bet you were sitting on your couch watching the movie Hackers from the early 1980’s with all the cool computer graphics, teens skateboarding around the city running from the cops and trying to steal millions of dollars from corrupt billion dollar companies that just care about what is in it for them instead of the little people.
Deep Web: Travel the Dark, Deep Web Using Tor Browser - Remain Anonymous and Remain Hidden From NSA and FBI.
Price: $2.99 USD. Words: 10,010. Language: English. Published: December 30, 2017 by Reader's Choice Club. Categories: Nonfiction » Computers and Internet » Internet / security
Are you interested in knowing how to Remain Anonymous Online and Evade NSA and FBI Spying? If your answer is YES continue reading! Deep Web, Dark Net, Tor. It is something that many people assume does not exist, or they are afraid to access it and even talk about it. But the truth be told, many upright, law-abiding citizens visit the Deep Web daily. They do so to keep hidden and...
Overview of Some Windows and Linux Intrusion Detection Tools
Price: $15.00 USD. Words: 20. Language: English. Published: February 21, 2018. Categories: Nonfiction » Computers and Internet » Internet / security
The paper evaluates some the security tools. Top security tools can be found in http://sectools.org/. Most important vulnerabilities in Windows and Linux can be found in www.sans.org/top20/. The paper covers the installation and configuration of the following security tools: • LANguard • Nessus • Snort • BASE • ACID • Rman • SnortCenter. • OSSEC • Sguil
Ultimate Guide for Being Anonymous
Price: $2.99 USD. Words: 3,990. Language: English. Published: September 8, 2017. Categories: Nonfiction » Computers and Internet » Internet / security
Together, we will set up an anonymous environment that guarantees maximum protection and shields your identity against prying eyes. Of course, there is no such thing as a zero-risk job, but we will try to get as close as possible.
Protecting Your Online Privacy
Price: $4.99 USD. Words: 7,920. Language: English. Published: January 4, 2014. Categories: Nonfiction » Computers and Internet » Internet / security
Along with a great revolution, the rapid advancement in the Internet technology has brought in several challenges as well. Protecting your online privacy is the biggest challenge. The irony is that not many people know that their online identity can be easily comprised. Anonymous browsing is the best way to hide from prying eyes. Though the content is technical in nature, it is easy to follow.
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Price: $3.99 USD. Words: 3,300. Language: English. Published: June 7, 2012. Categories: Nonfiction » Computers and Internet » Security / cryptography, Nonfiction » Computers and Internet » Internet / security
Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.
Hack Computer System For Noobee
You set the price! Words: 45,320. Language: English. Published: July 22, 2018. Categories: Nonfiction » Computers and Internet » Internet / security, Nonfiction » Computers and Internet » Security
This book only for noobee people who wanna be a hacker then you can read from this book computer hacking hack from another network information victim and many more We have noticed that there are lots of books that glamorize hackers. To read these books you would think