Nonfiction » Computers and Internet » Security

Putin's Kremlin - Epicenter of Global Cyber Warfare
Price: $4.99 USD. Words: 13,490. Language: English. Published: June 8, 2017. Categories: Nonfiction » Politics and Current Affairs » World leaders, Nonfiction » Computers and Internet » Security
Putin's Kremlin - Epicenter of Global Cyber Warfare: This goal of this eBook is provide a wake-up call for the new US government’s executive leadership, however well intentioned, yet seemingly naïve, that Russian cyber warfare is a clear and present danger to national security. Key topics include An Historical Primer on Russia' Leaders, Putin’s Pathology, The Era of Cyber Warfare.
2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution
Price: $5.99 USD. Words: 26,740. Language: English. Published: March 6, 2017. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This is a complete reproduction of the final report of the Defense Science Board Task Force on Cyber Deterrence released in late February 2017. The Task Force was asked to consider the requirements for deterrence of the full range of potential cyber attacks against the United States.
National Guard Forces in the Cyber Domain - Integrating the Guard into National Cyber Forces and Defenses, Cybersecurity Protecting Critical Infrastructure from Hactivists and Terrorist Groups
Price: $5.99 USD. Words: 30,210. Language: English. Published: February 23, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Today the nation faces the new challenge of how to best defend itself against cyber attacks. Just as the militia, forbearers to the National Guard, enabled George Washington's attack against Trenton, the National Guard stands ready today to work with Department of Defense (DoD) to counter the growing cyber threat.
Building a Life and Career in Security
Price: $2.99 USD. Words: 11,760. Language: English. Published: February 17, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Career Guides » Computer Science
As I’ve looked at my own path and helped others along their journey, there is a framework for success in information security. My goal in writing this book is give you the confidence to grow your own career in information security. I’ve analyzed my career and the careers of others to design a plan to build a successful career in information security.
WarBerry Pi: The Complete Guide
Price: Free! Words: 7,470. Language: English. Published: February 15, 2017. Categories: Nonfiction » Computers and Internet » Security
This is a comprehensive introduction from the inventor of WarBerry Pi. This short volume teaches you what WarBerryPi is—and how you can use it. The main purpose of the WarBerryPi is to be useful during Red Team operations. Since the whole Red Team/Blue Team terminology stems from the military, @sec_groundzero wanted to baptize his project with a military-related term, hence the name “WarBerryPi.”
A Best Practices Guide for Comprehensive Employee Awareness Programs
Price: Free! Words: 10,200. Language: English. Published: February 9, 2017. Categories: Nonfiction » Business & Economics » Education, Nonfiction » Computers and Internet » Security
With 20-plus years in the adult learning and employee awareness business, MediaPro has ample experience in helping organizations teach their employees. In this guide, we’ve tapped some of our best talent to explain some time-tested best practices for running employee awareness programs in cybersecurity and privacy.
Essentials of Cybersecurity
Price: Free! Words: 22,950. Language: English. Published: February 7, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Career Guides » Computer Science
Essentials of Cybersecurity is a crowdsourced effort from the members of the Peerlyst online community. These InfoSec experts share their perspective and tips on getting the basics right, from understanding cybersecurity’s vital importance and developing a corporate security culture to protecting your telecom infrastructure and making the most of security technology.
Digital Debates: CyFy Journal Volume 3 (2016)
Series: GP and ORF e-books. Price: Free! Words: 37,790. Language: English. Published: January 3, 2017. Categories: Nonfiction » Computers and Internet » Security
The world is witnessing two parallel sets of conversations on digital policy. One is largely focused on translating rights from the offline world to the online world. The other attempts to negotiate the very nature of, and need for, these rights. The real challenge therefore lies in creating both a public sphere and a digital public sphere that attends to the integrity of both conversations.
Make Your Smartphone 007 Smart
Price: $2.99 USD. Words: 9,030. Language: English. Published: December 13, 2016 and represented by alanpearce.com. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Engineering, trades, and technology » Telecommunications
The smartphone in your pocket can easily be turned into a high-tech spy tool and counter-surveillance device to rival anything that Ian Fleming’s Q might have dreamt up. You can communicate secretly, browse the web anonymously, access the Deep Web and hidden networks, view banned content, download privately and continue using Twitter and Facebook if their services are ever blocked locally.
Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM)
Price: $5.99 USD. Words: 32,290. Language: English. Published: December 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » European
Defining and understanding what constitutes a cyber-attack is a complicated matter, largely due to the fact that there has not yet been a large-scale cyber-attack upon any nation.
The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
Price: $5.99 USD. Words: 32,670. Language: English. Published: October 3, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination.
Examining Cyber Command Structures - History of Air and Space Domains, Nuclear Weapons Mission, Alternative Force Structures for Cyber Command and Control (C2), USCYBERCOM
Price: $5.99 USD. Words: 26,430. Language: English. Published: October 2, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
As the Department of Defense executes its mission in its newest warfare domain, cyberspace, some have questioned its choices with regard to command and control of its cyber forces. This thesis examines historical cases of new warfare domains and how the Department of Defense structured the command and control elements of its forces dedicated to the air and space domains.
Strategies for Resolving the Cyber Attribution Challenge - Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
Price: $4.99 USD. Words: 36,450. Language: English. Published: September 5, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Malicious cyber actors exploit gaps in technology and international cybersecurity cooperation to launch multistage, multi-jurisdictional attacks. Rather than consider technical attribution the challenge, a more accurate argument would be that solutions to preventing the attacks of most concern, multistage multi-jurisdictional ones, will require not only technical methods.
Principles of War for Cyberspace - Cultures of Strategy in Cyberspace, Clausewitzian Cyberthink, Sun Tzu Cyberthink, Yin and Yang in Cyberspace, Doctrine and Education
Price: $2.99 USD. Words: 17,360. Language: English. Published: September 5, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
As the United States Air Force develops doctrine, education, and organization for cyberspace, we need to consider the traditional principles of war and how/if they apply to cyberspace, and under what situations, so we can develop a conceptual foundation for effective cyberspace warfighting doctrine.
Las Estafas Digitales
Price: $3.95 USD. Words: 29,030. Language: Spanish. Published: May 30, 2016 by IT Campus Academy. Categories: Nonfiction » Computers and Internet » Internet, Nonfiction » Computers and Internet » Security
Internet ha crecido exponencialmente en la última década, y con el ello el comercio electrónico, pero lo que es peor, el fraude y el engaño también ha crecido exponencialmente conjuntamente al comercio electrónico.
Seguridad en Bases de Datos y Aplicaciones Web
Price: $4.95 USD. Words: 19,870. Language: Spanish. Published: May 18, 2016 by IT Campus Academy. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Security / viruses
Con la creciente demanda de las TI por parte de las empresas y, también, por parte de las personas físicas, los problemas no tardaron en surgir. Las personas físicas y jurídicas han sufrido robos. Existen páginas en internet que son fraudes y son falsificaciones de otras páginas reales existentes. Todo estos ha ocasionado que la seguridad se convierta en una prioridad.
Flying and Fighting in Cyberspace - Implications for Command and Control, Network Operations, and ISR, Threat Agent Profiles, Mapping of Enemy Systems and Data, Cyber Attack and Defense, Funding
Price: $5.99 USD. Words: 126,850. Language: English. Published: April 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain.
Don't Step in the Trap: How to Recognize and Avoid Email Phishing Scams
Price: $2.99 USD. Words: 11,270. Language: American English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Internet / security, Nonfiction » Computers and Internet » Security
(5.00 from 1 review)
More and more consumers and businesses are being victimized by increasingly sophisticated email scams, including "phishing" schemes. This handy, step-by-step guide, written in plain English, will show you how to recognize phishing emails. It will help you avoid being taken in by these scams, without having to decipher a lot of computer jargon. Includes quick reference guide and glossary.
Oracle Quick Guides - Part 4 - Oracle Administration: Security and Privilege
Series: Oracle Quick Guides. Price: $3.50 USD. Words: 19,490. Language: English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Database management, Nonfiction » Computers and Internet » Security
This is Part 4 of a series of quick learning guides for Oracle designers, developers and managers including database administrators. Part 4 introduces early entrants with basic Oracle skills to the main concepts of Oracle data security and user privilege management and administration.
Flexible Options for Cyber Deterrence - Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment
Price: $5.99 USD. Words: 112,340. Language: English. Published: April 4, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain.

Related Categories