- African American fiction
- Alternative history
- Children’s books
- Coming of age
- Cultural & ethnic themes
- Fairy tales
- Gay & lesbian fiction
- Graphic novels & comics
- Humor & comedy
- Literary collections
- Mystery & detective
- Plays & Screenplays
- Science fiction
- Themes & motifs
- Thriller & suspense
- Transgressional fiction
- Visionary & metaphysical
- Women's fiction
- Young adult or teen
- Antiques & Collectibles
- Art, Architecture, Photography
- Business & Economics
- Career Guides
- Children's Books
- Comics (nonfictional)
- Computers and Internet
- Cooking, Food, Wine, Spirits
- Education and Study Guides
- Engineering, trades, and technology
- Gay and Lesbian
- General reference
- Health, wellbeing, & medicine
- Home and Garden
- Language Instruction
- Literary criticism
- New Age
- Politics and Current Affairs
- Relationships and Family
- Religion and Spirituality
- Science and Nature
- Sex and Relationships
- Social Science
- Sports & outdoor recreation
- True Crime
How to Hack Like a Legend by Sparc Flow
Price: $9.99 USD. Words: 37,110. Language: English. Published: July 21, 2018. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Security / viruses
This is the story of a hacker who met his match while breaking into a company: machine learning, behavioral analysis, artificial intelligence... Most hacking tools simply crash and burn in such a hostile environment. What is a hacker to do when facing such a fully equipped opponent?
Passive Regulation: General Systems Design Principles by Gerald M. Weinberg
Series: Systems Thinking, Book 2. Price: $9.99 USD. Words: 61,070. Language: English. Published: June 3, 2011. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Computer science
Passive Regulation is Volume 2 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" This second books tackles the next question, namely "Why do things stay the same?"
Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources by Progressive Management
Price: $8.99 USD. Words: 161,510. Language: English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet / security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces five important military reports and studies dealing with cyberspace attacks and computer network security.
How to Investigate Like a Rockstar by Sparc Flow
Price: $9.99 USD. Words: 24,060. Language: English. Published: July 21, 2018. Categories: Nonfiction » Computers and Internet » Networking / security, Nonfiction » Computers and Internet » Security
"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers.
Building a Life and Career in Security by Jay Schulman
Price: $2.99 USD. Words: 11,030. Language: English. Published: February 17, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Career Guides » Computer Science
As I’ve looked at my own path and helped others along their journey, there is a framework for success in information security. My goal in writing this book is give you the confidence to grow your own career in information security. I’ve analyzed my career and the careers of others to design a plan to build a successful career in information security.
Principles of War for Cyberspace - Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education by Progressive Management
Price: $2.99 USD. Words: 17,360. Language: English. Published: September 5, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
As the United States Air Force develops doctrine, education, and organization for cyberspace, we need to consider the traditional principles of war and how/if they apply to cyberspace, and under what situations, so we can develop a conceptual foundation for effective cyberspace warfighting doctrine.
Make Your Smartphone 007 Smart by Conrad Jaeger
Price: $2.99 USD. Words: 9,030. Language: English. Published: December 13, 2016 and represented by alanpearce.com. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Engineering, trades, and technology » Telecommunications
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up. You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.
Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism by Progressive Management
Price: $1.99 USD. Words: 51,560. Language: English. Published: October 6, 2014. Categories: Nonfiction » Computers and Internet » Security
This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains.
Bitcoin – Security and Privacy by Lexie M
Price: $1.99 USD. Words: 17,550. Language: English. Published: March 21, 2018. Categories: Nonfiction » Computers and Internet » Security
As an electronic currency, Bitcoin is often presented as both anonymous and perfectly transparent. Where the truth really lies depends on how you use it. "Bitcoin – Security and Privacy" explains how to safely store and buy Bitcoin, how to use it efficiently, privately or transparently.