Welcome to Smashwords!

Check out our new interface for discovering great ebooks! Read the official announcement at the Smashwords Blog.

Please confirm your erotica preferences.

Learn more about erotica controls. You may change these settings at any time.

[Close]

Nonfiction » Computers & Internet » Security

Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment
Price: $6.99 USD. Words: 36,670. Language: English. Published: March 21, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
Experts have been predicting the onset of cyber warfare for decades. Yet, despite the relative ease and anonymity with which cyber-attacks can be conducted on military targets, the preponderance of historical cyber-related actions has been largely confined to the realms of espionage and crime.
Applying Lessons Learned from Interwar Airpower (1919-1939) to Joint Warfighting With Cyberpower - Change Agents Moffett, Patrick, Reeves; Army and Navy Doctrine, Personnel, and Technology
Price: $5.99 USD. Words: 33,600. Language: English. Published: March 5, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
The United States has yet to use cyberwarfare in a major conflict, and the military services have differing ideas on what role cyberwarfare will play in America's next war. In addition, the services have unique and often contradictory perspectives on how they see the employment of cyberwarfare in military operations, and this conflict may affect combatant commanders' ability to employ cyberpower.
How i Survived a Ransomware Attack
Price: $10.00 USD. Words: 6,370. Language: English. Published: March 4, 2019. Categories: Nonfiction » Computers & Internet » Security
A ransomware attack can be devastating, and no business is immune from the threat. To survive a ransomware attack, you need more than data backup. You need to know what a Ransomware attack and how to make sure it doesn't wreck you and your business
U.S. Army Concept for Cyberspace and Electronic Warfare (EW) Operations 2025-2040 (TRADOC 525-8-6) - Electromagnetic Spectrum Management, Threats from Hackers, Bot Nets, Phishers, Foreign Intelligence
Price: $5.99 USD. Words: 26,890. Language: English. Published: February 3, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
The U.S. Army is the Nation's principal land force organized, trained, and equipped for prompt and sustained combat on land. Today's adversaries have studied how the U.S. Joint Force prefers to operate and have adapted by developing capabilities that contest U.S. operations on land, at sea, in the air, in space, and in cyberspace, as well as across the electromagnetic spectrum.
Cyber Power: Attack and Defense Lessons from Land, Sea, and Air Power - Estonia and Georgia Cyber Conflicts, Through the Lens of Fundamental Warfighting Concepts Like Initiative, Speed, and Mobility
Price: $8.99 USD. Words: 58,900. Language: English. Published: January 24, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
Cyberspace is the newest warfighting domain, but heretofore it has been the nearly exclusive purview of technical experts, not warfighters. Consequently, much of the work on cyber power theory has eschewed the traditional concepts and lexicon of war in favor of language more familiar to technical experts in information communications technology.
Spying on Everything
Price: Free! Words: 2,570. Language: English. Published: December 27, 2018. Categories: Nonfiction » Computers & Internet » Security
A paranoid way of thinking which sickens you. With possible solutions. Imagine: All data of you is connected to one big pile and analysts can tell almost exactly all of you. You will get a possible solution to a fictive world for people at the Bottom. A world which is unfortunately reality to people at the Top. Going offline is procrastination.
Computer Security & Risk Analysis
Price: $55.00 USD. Words: 8,420. Language: English. Published: November 23, 2018. Categories: Nonfiction » Computers & Internet » Security
Book Details: Book Title: Computer Security & Risk Analysis Publisher: Independent Publishing, 2018 ISBN-13: 978-1731512895 ISBN-10: 1731512899 EAN: 9781731512895 Book language: English By (author) : Dileep Keshava Narayana Number of Pages: 32 Published on: 2018-11-18 Category: Informatics, IT
Cyber Security for Critical Energy Infrastructure - Enhancing Electrical Grid Security, Attacks on Ukrainian and Western Energy Sectors, Critical Infrastructure Management, Safeguards, Mitigation
Price: $6.99 USD. Words: 32,250. Language: English. Published: November 10, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Power Resources / Electrical
The United States power grid is a logical target for a major cyber attack because it connects all of the nation's critical infrastructures with electricity. Attackers consistently exploit vulnerabilities of the bulk power system and are close to being able to disrupt electrical distribution.
Looking Back to the Future of Cyberspace Warfare - Case Studies of Military Operations, Russian Attack on Georgia, U.S. Surge in Iraq, Attack on Iran Nuclear Facility, Land, Maritime, Air Theories
Price: $6.99 USD. Words: 24,480. Language: English. Published: October 20, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
To some, the term cyberspace is a daunting term. For U.S. military leaders, cyberspace needs to be embraced and understood in order to effectively integrate the capabilities offered in and through cyberspace with all military operations. Cyberspace should be viewed as another domain in which to operate, in other words a different or additional battlespace.
Chinese Cyber Economic Espionage: Motivations and Responses - U.S. Response During Obama Administration, Inability of America to Stem Chinese Theft of Intellectual Property from Businesses
Price: $6.99 USD. Words: 30,070. Language: English. Published: October 18, 2018. Categories: Nonfiction » History » Asian, Nonfiction » Computers & Internet » Security
Despite the apparent recognition of a problem, the U.S. has been seemingly ineffective in deterring or dissuading continued Chinese cyber activity—despite the potential significant impact to economic and national security.
Cyber Attacks and the Legal Justification for an Armed Response - Need to Clarify Definition of Cyberattack, Legal Guidelines, Law of War and Armed Conflict, Severity and Human Casualties
Price: $6.99 USD. Words: 22,630. Language: English. Published: September 27, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
This monograph proposes policy factors to be used to decide whether armed response that is legally justifiable is warranted. Political leaders need to determine the likelihood of attack, and look at the effects of multiple types of scenarios, not just the worst case.
Some Tutorials In Computer Hacking
Price: $20.00 USD. Words: 100. Language: English. Published: August 20, 2018. Categories: Nonfiction » Computers & Internet » Security
The objective of this work is to provide some quick tutorials in certified ethical hacking.
How to Become Anonymous, Secure and Free Online
Price: Free! Words: 36,960. Language: American English. Published: August 7, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Politics & Current Affairs » Current affairs
(5.00 from 1 review)
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources. Ethical concerns for anonymous use are also discussed, along with legal issues that affect freedom and privacy for common citizens who use the internet.
Recruiting the Cyber Leader: An Evaluation of the Human Resource Model Used for Recruiting the Army's Cyber Operations Officer - Recommendations for This Fast-Paced Operational Environment
Price: $7.99 USD. Words: 52,070. Language: English. Published: August 2, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
For the first time since the creation of the Special Forces branch in 1987, the Army authorized the creation of a new branch, the Cyber branch. With this, the Army joined the ranks of other organizations in this rapidly expanding arena. The Army found itself in a situation where it needed to quickly fill the positions required of this new branch.
Hack Computer System For Noobee
You set the price! Words: 45,320. Language: English. Published: July 22, 2018. Categories: Nonfiction » Computers & Internet » Internet / security, Nonfiction » Computers & Internet » Security
This book only for noobee people who wanna be a hacker then you can read from this book computer hacking hack from another network information victim and many more We have noticed that there are lots of books that glamorize hackers. To read these books you would think
Interactive Wargaming Cyberwar: 2025 - Support Tool for Training of Basic Cyberspace Operations Concepts to Military Professionals, Building Player's Knowledge Base and Experience
Price: $7.99 USD. Words: 35,630. Language: English. Published: July 21, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
The objective of CyberWar: 2025 is to stimulate, build, and increase the players' knowledge base and experience in planning and practical application of cyberspace operations in the areas of defensive cyberspace operations, offensive cyberspace operations, and computer network exploitation. CyberWar: 2025 focuses on doctrine and doctrinal training as a serious game.
Cybersecurity Education for Military Officers - Recommendations for Structuring Coursework to Eliminate Lab Portion and Center Military-Relevant Discussions on Cyber-Defense Management
Price: $7.99 USD. Words: 37,810. Language: English. Published: July 21, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
Cyber threats are a growing concern for our military, creating a need for cybersecurity education. Current methods used to educate students about cyber, including annual Navy Knowledge Online training, are perceived to be ineffective.
How to Hack Like a Legend
Price: $9.99 USD. Words: 37,110. Language: English. Published: July 21, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Computers & Internet » Security / viruses
This is the story of a hacker who met his match while breaking into a company: machine learning, behavioral analysis, artificial intelligence... Most hacking tools simply crash and burn in such a hostile environment. What is a hacker to do when facing such a fully equipped opponent?
How to Investigate Like a Rockstar
Price: $9.99 USD. Words: 24,060. Language: English. Published: July 21, 2018. Categories: Nonfiction » Computers & Internet » Networking / security, Nonfiction » Computers & Internet » Security
"There are two kinds of companies: those that have been breached and those that do not know it yet." The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers.
Cyber Sequrity Botnet Attacks: Procedures and Methods
You set the price! Words: 8,680. Language: English. Published: July 10, 2018. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » Computers & Internet » Security
The botnet, a collection of compromised computers, is one of the latest technologies in the evolution of cybercrime. Cybercriminals, motivated by financial gain, use those infected computers as an equipment of cybercrime. For example, botnets are used in Distributed Denial of Service (DDoS) extortion scams, sending of spam, and running arbitrary network services for phishing.

Related Categories