- African American fiction
- Alternative history
- Children’s books
- Coming of age
- Cultural & ethnic themes
- Fairy tales
- Gay & lesbian fiction
- Graphic novels & comics
- Humor & comedy
- Literary collections
- Mystery & detective
- Plays & Screenplays
- Science fiction
- Themes & motifs
- Thriller & suspense
- Transgressional fiction
- Visionary & metaphysical
- Women's fiction
- Young adult or teen
- Antiques & Collectibles
- Art, Architecture, Photography
- Business & Economics
- Career Guides
- Children's Books
- Comics (nonfictional)
- Computers and Internet
- Cooking, Food, Wine, Spirits
- Education and Study Guides
- Engineering, trades, and technology
- Gay and Lesbian
- General reference
- Health, wellbeing, & medicine
- Home and Garden
- Language Instruction
- Literary criticism
- New Age
- Politics and Current Affairs
- Relationships and Family
- Religion and Spirituality
- Science and Nature
- Sex and Relationships
- Social Science
- Sports & outdoor recreation
- True Crime
Building a Life and Career in Security by Jay Schulman
Price: $2.99 USD. Words: 11,760. Language: English. Published: February 17, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Career Guides » Computer Science
As I’ve looked at my own path and helped others along their journey, there is a framework for success in information security. My goal in writing this book is give you the confidence to grow your own career in information security. I’ve analyzed my career and the careers of others to design a plan to build a successful career in information security.
WarBerry Pi: The Complete Guide by @sec groundzero
Price: Free! Words: 7,470. Language: English. Published: February 15, 2017. Categories: Nonfiction » Computers and Internet » Security
This is a comprehensive introduction from the inventor of WarBerry Pi. This short volume teaches you what WarBerryPi is—and how you can use it. The main purpose of the WarBerryPi is to be useful during Red Team operations. Since the whole Red Team/Blue Team terminology stems from the military, @sec_groundzero wanted to baptize his project with a military-related term, hence the name “WarBerryPi.”
A Best Practices Guide for Comprehensive Employee Awareness Programs by MediaPro
Price: Free! Words: 10,200. Language: English. Published: February 9, 2017. Categories: Nonfiction » Business & Economics » Education, Nonfiction » Computers and Internet » Security
With 20-plus years in the adult learning and employee awareness business, MediaPro has ample experience in helping organizations teach their employees. In this guide, we’ve tapped some of our best talent to explain some time-tested best practices for running employee awareness programs in cybersecurity and privacy.
Essentials of Cybersecurity by @sec groundzero
Price: Free! Words: 22,950. Language: English. Published: February 7, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Career Guides » Computer Science
Essentials of Cybersecurity is a crowdsourced effort from the members of the Peerlyst online community. These InfoSec experts share their perspective and tips on getting the basics right, from understanding cybersecurity’s vital importance and developing a corporate security culture to protecting your telecom infrastructure and making the most of security technology.
Digital Debates: CyFy Journal Volume 3 (2016) by Global Policy
Series: GP and ORF e-books. Price: Free! Words: 37,790. Language: English. Published: January 3, 2017. Categories: Nonfiction » Computers and Internet » Security
The world is witnessing two parallel sets of conversations on digital policy. One is largely focused on translating rights from the offline world to the online world. The other attempts to negotiate the very nature of, and need for, these rights. The real challenge therefore lies in creating both a public sphere and a digital public sphere that attends to the integrity of both conversations.
Make Your Smartphone 007 Smart by Conrad Jaeger
Price: $2.99 USD. Words: 9,030. Language: English. Published: December 13, 2016 and represented by alanpearce.com. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Engineering, trades, and technology » Telecommunications
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up. You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.
Principles of War for Cyberspace - Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education by Progressive Management
Price: $2.99 USD. Words: 17,360. Language: English. Published: September 5, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
As the United States Air Force develops doctrine, education, and organization for cyberspace, we need to consider the traditional principles of war and how/if they apply to cyberspace, and under what situations, so we can develop a conceptual foundation for effective cyberspace warfighting doctrine.
Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams by Brett Smith
Price: $2.99 USD. Words: 11,270. Language: American English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Internet / security, Nonfiction » Computers and Internet » Security(5.00 from 1 review)
More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including "phishing" schemes. This handy, step-by-step guide, written in plain English, will show you how to recognize phishing emails. It will help you avoid being taken in by these scams, without having to decipher a lot of computer jargon. Includes quick reference guide and glossary.
A Simpler Guide to Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for your Gmail, Docs and other Google services by Ceri Clark
Price: Free! Words: 12,730. Language: English. Published: February 24, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Reference » Handbooks and Manuals
Are you worried about your online safety but don’t know where to start? Do you have a Gmail account and want to make it more secure? Do you want to protect your emails from opportunist identity thieves, hackers and scammers? You don't need to be a cyber security expert to protect your information. If you have secure email then this can wipe out the opportunist thief. Find out how in this guide.
Securing Amazon Web Services by Jay Schulman
Price: $2.99 USD. Words: 3,740. Language: English. Published: December 15, 2015. Categories: Nonfiction » Computers and Internet » Security
As I was researching how to secure my AWS resources, I realized there isn't a one-stop guide for securing every piece of AWS. I've compiled from around the web the best resources on securing Amazon Web Services.
Script Injection by L Mohan Arun
Price: $2.99 USD. Words: 1,750. Language: American English. Published: November 1, 2015. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Business & Economics » Small business and entrepreneurship
Buy this book if your personal website has been hacked by hackers. Your website could be loading unwanted pages from other websites heres how to fix it yourself In this book you'll learn how to: Be able to tell whether your website is infected by script injection attack. Fix your own personal and/or business website when a script injection attack is detected. Save $$$ spent on hackfix experts.
Hacking Into Thinking Machines by Yashsawarkar
Price: $1.56 USD. Words: 5,730. Language: English. Published: June 10, 2015. Categories: Nonfiction » Computers and Internet » Security
Introduce to system hacking, introduce readers the fundamental concept involved in system hacking. Password hacking also where the reader can perform on live machine where you can get real time experience to exploit the vulnerability of system this will also introduce numerous tools on password cracking, also this book focuses on some advance concept on hacking
Be Safe in CyberSpace by Pooja Malhotra
Price: $1.99 USD. Words: 7,520. Language: English. Published: February 26, 2015 by Zorba Books. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Children's Books » Computers / Internet
The Internet is a wonderful place where you can socialize, play games, collect information, get updates and learn new things. All this, while sitting in the comfort of your home! You may wonder..."Why then do I need Internet safety while chatting with friends or playing online? This little book empowers you with information so you can make Cyberspace a safe, happy place.
Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism by Progressive Management
Price: $1.99 USD. Words: 51,560. Language: English. Published: October 6, 2014. Categories: Nonfiction » Computers and Internet » Security
This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains.
Surviving Modern Technology: Understanding Safety and Privacy by Stefan H Unger PhD
You set the price! Words: 11,180. Language: English. Published: September 12, 2014 by Real Psych Solutions. Categories: Nonfiction » Computers and Internet » Security
Computers are wonderful. The internet is fantastic. You are not safe online … unless you work at it. The goals of this book are to help motivate you to take some action and to teach you how to think about the privacy and security of your information and devices. But it's not so much a "how to" book (i.e., what buttons to press) as a "why to" book.
Your Digital Footprint Password Protection Requirements by Ronald E. Hudkins
Price: $2.99 USD. Words: 9,190. Language: English. Published: June 18, 2014. Categories: Nonfiction » Computers and Internet » Security
The precautions that you have to take to prevent the constant password stealing problems from taking place are relatively simple. In this book, you will learn a lot about how you can come up with strong passwords. Also included in this book are some of the supporting pieces of information that can help you raise awareness on why you have to come up with strong passwords in the first place.
Beginner's Guide for Cybercrime Investigators by Nicolae Sfetcu
Price: $2.99 USD. Words: 30,100. Language: English. Published: June 17, 2014. Categories: Nonfiction » Computers and Internet » Security
Cybercrime is a phenomenon of our time, often reflected in the media. Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. The computer itself is the main source of information for the investigator.
Einfache Sicherheit für Smartphones und Tablets by Ronald Schlager
Price: $0.99 USD. Words: 6,200. Language: German. Published: June 3, 2014. Categories: Nonfiction » Computers and Internet » Security
Das Buch hilft Ihnen als privater oder firmenmäßiger Nutzer mobiler Geräte wie Smartphones oder Tablet Computers, Ihre Geräte und Daten sowohl physisch wie auch logisch zu schützen.
Online Security – Password Keys by O-O Happiness
Price: $2.99 USD. Words: 2,470. Language: English. Published: May 28, 2014. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Reference
Each week there seems to be a new online password scare as a major company is hacked and your passwords exposed to the world. Yes, you should have a complex password, yes you should have a different password for each site -but no, you don't have a computer brain. Why not use our password keys? Simple to use, safe as it stores nothing online and you don't have to remember impossibly long passwords.