Nonfiction » Computers & Internet » Security / cryptography

ZK-Swaps by Portal: Fast, liquid, private atomic swaps. Cross-chain zero-knowledge exchange protocol for trustless anonymous trading of blockchain tokens like Bitcoin, Ethereum & other crypto assets
Price: Free! Words: 6,110. Language: English. Published: October 15, 2019. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Business & Economics » E-commerce / online trading
A white paper detailing Portal’s cross-chain zero-knowledge exchange protocol for trustless anonymous trading of blockchain tokens like Bitcoin, Ethereum & other crypto assets. (PART 1 of 3)
The Present and Potential Future of Mac Hardware Implants
Price: Free! Words: 2,780. Language: English. Published: April 19, 2019. Categories: Nonfiction » Computers & Internet » Security / cryptography
A whitepaper studying current physical implant attacks viable against the Mac hardware platform, as well as potential developments that may be observed in the future.
Cryptography for JavaScript Developer
Price: $2.99 USD. Words: 7,030. Language: English. Published: December 18, 2018. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Programming
Cryptography for javascript developers
Website Hacking - More Clowns, Idiots, & Assholes (CIA)
Price: Free! Words: 10,030. Language: English. Published: October 22, 2018. Categories: Nonfiction » True Crime » Espionage, Nonfiction » Computers & Internet » Security / cryptography
The CIA and NSA continue to stalk, harass, and hack the websites of TargetedJustice.com and RLighthouse.com. This short ebook documents the continued illegal hacking by the CIA and NSA. This illegal hacking includes up to 6 simultaneous logins into the account, apparently for watching whatever we do. Readers will note there are three logins during one minute, for most login events.
A Simple Guide: Bitcoin
Price: $2.00 USD. Words: 2,360. Language: English. Published: February 17, 2018 by Epic Worlds, LLC. Categories: Nonfiction » Business & Economics » E-commerce / general, Nonfiction » Computers & Internet » Security / cryptography
Bitcoin is all the rage right now but what is it exactly? This book is a beginner's guide to the digital currency giving the reader a sneak peek into a system that has taken the world by storm. 
The Essential Guide to Understanding Password-Based Authentication
Price: Free! Words: 4,970. Language: English. Published: December 5, 2014. Categories: Nonfiction » Computers & Internet » Security / cryptography
Even veteran IT pros don’t fully understand the authentication technologies used by Windows and other operating systems. With their deep knowledge of authentication protocols such as NTLM and Kerberos, hackers can steal your users' credentials and then secretly take your most valuable data. In this guide, you’ll learn the techniques hackers use to subvert authentication controls.
Bitcoin: The Ultimate A - Z Of Profitable Bitcoin Trading & Mining Guide Exposed!
Series: The Blokehead Success Series. Price: $2.99 USD. Words: 8,660. Language: English. Published: November 19, 2014 by Yap Kee Chong. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Business & Economics » E-commerce / online trading
How does the bitcoin protocol work? A person cannot mix indefinite bitcoins. The bitcoin protocol states that there will only be twenty-one million bitcoins to be produced by the miners. These bitcoins will then be subdivided into smaller bits. The smallest bit is called ‘satoshi’ named after the bitcoin founder and the divisible amount is one hundred millionth of a bitcoin. Learn more here!
Spurlos! Wie ich anonymes Surfen im Netz lernte
Price: $4.99 USD. Words: 12,450. Language: German. Published: May 26, 2014. Categories: Nonfiction » Computers & Internet » Security / cryptography
"Spurlos! Wie ich anonymes Surfen im Netz lernte" ist ein Tagebuch von Journalist und Blogger Tobias Gillen, das er auf seinem Weg zu anonymer und sicherer Kommunikation
Easy Password Creation Systems For Life (Introduction)
Series: Easy Password Creation Systems For Life. Price: Free! Words: 9,990. Language: English. Published: May 20, 2014. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Entertainment » Games, puzzles, & brain twisters
All your passwords satisfied for life: effortlessly create all the passwords you will need for the rest of your life. All you need is one sheet of paper. Simple. Anyone can do it (almost).
Easy Password Creation Systems For Life
Series: Easy Password Creation Systems For Life. Price: $5.00 USD. Words: 4,900. Language: English. Published: April 14, 2014. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Entertainment » Games, puzzles, & brain twisters
All your passwords satisfied for life: effortlessly create all of the passwords you will need for the rest of your life. All you need is one sheet of paper. Simple. Anyone can do it (almost).
How protect my files pc
Price: $4.99 USD. Words: 7,130. Language: English. Published: May 27, 2013. Categories: Essay » Technology, Nonfiction » Computers & Internet » Security / cryptography
Fantastic guide that helps you step by step and in a simple way to protect your files, pictures, vodeos and important documents that you have stored on your PC, do not allow third parties access to your information, protect them with this fabulos and amazing guide now .
Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
Price: $4.99 USD. Words: 2,420. Language: English. Published: July 17, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Internet / security
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS.
Street Cryptography
Price: $0.99 USD. Words: 8,060. Language: American English. Published: July 7, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Social Science » Political science
(4.00 from 1 review)
A quick and easy to use guide on creating your own cipher. This book covers several historic ciphers and builds concepts that will allow you to make one that is reasonably secure.
Securing Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools
Price: $3.99 USD. Words: 3,300. Language: English. Published: June 7, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Internet / security
Booklet for anyone who wants to keep their email correspondence private and protect it from unauthorized access. Step-by-step guide explains how to ensure security of email communication by utilizing existing technology.
Protecting Confidential Information: How to Securely Store Sensitive Data
Price: $3.99 USD. Words: 3,120. Language: English. Published: April 25, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Data storage
Booklet for anyone who wants to know how to keep secrets on home computer, or prevent sensitive data from disclosure on office workstation. Topics include: how to break Windows and steal data from computer, pros and cons of using standard Windows data protection mechanisms, several steps to follow in order to keep information secured, using cryptographic solutions for secure storage, and more
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless
Price: $3.99 USD. Words: 2,950. Language: English. Published: April 24, 2012. Categories: Nonfiction » Computers & Internet » Internet / security, Nonfiction » Computers & Internet » Security / cryptography
Booklet for anyone who wants to keep private and free of censorship Internet access. Step-by-step guide explains how to ensure security on public wireless network, escape the corporate firewall loggers, and avoid Internet proxy filters.
Securing Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build
Price: $4.99 USD. Words: 4,840. Language: English. Published: April 22, 2012. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Software development & engineering / general
Booklet for developers and security professionals on how to implement code obfuscation, .NET strong name signing, and Authenticode code signing in order to protect applications deployment. The guide contains detailed description of different code signing implementation options from basic software to sophisticated hardware solution.