Nonfiction » Computers and Internet » Security

Flying and Fighting in Cyberspace - Implications for Command and Control, Network Operations, and ISR, Threat Agent Profiles, Mapping of Enemy Systems and Data, Cyber Attack and Defense, Funding
Price: $5.99 USD. Words: 126,850. Language: English. Published: April 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain.
Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources
Price: $8.99 USD. Words: 161,510. Language: English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet / security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces five important military reports and studies dealing with cyberspace attacks and computer network security.
Flexible Options for Cyber Deterrence - Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment
Price: $5.99 USD. Words: 112,340. Language: English. Published: April 4, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain.
Realities of Deterrence and Retaliatory Options to Attacks in Space and Cyberspace - Characterizing the Asymmetric Threat, Hacking, Antisatellite Capabilities, Distributed Denial-of-Service (DDOS)
Price: $4.99 USD. Words: 108,060. Language: English. Published: March 31, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book discusses the realities of deterrence and retaliatory options to attacks in space and cyberspace.
Safe Computing is Like Safe Sex: You Have to Practice it to Avoid Infection
Price: $3.99 USD. Words: 48,800. Language: English. Published: March 27, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Security / viruses
Security expert and Computer Executive, Richard Lowe, presents the simple steps you can take to protect your computer, photos and information from evil doers and viruses. Using easy-to-understand examples and simple explanations, Lowe explains why hackers want your system, what they do with your information, and what you can do to keep them at bay.
Cyber War: The Next Frontier for NATO - Distributed Denial of Service (DDOS) Website Internet Attacks, Hacktivists, Hackers, Cyber Attacks, Cyber Terrorism, Tallinn Manual, Possible Responses
Price: $5.99 USD. Words: 118,440. Language: English. Published: March 27, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this unique study analyzes and explores the unique position that NATO operates in and the duty of NATO to protect its alliance members, and member states to protect each other.
Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis
Price: $6.99 USD. Words: 121,100. Language: English. Published: March 6, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Professionally converted for accurate flowing-text e-book format reproduction, this study examines how the U.S. government can follow a path to an effective cyberspace deterrence strategy by examining key periods in its past, countering the contemporary hypothesis that the unique nature of cyberspace alters warfare in such a way that historical approaches to deterrence no longer apply.
Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack (EMP), Countermeasures, Warfighter Cyber Security, Network Centric Warfare
Price: $6.99 USD. Words: 150,040. Language: English. Published: February 23, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this volume presents the results of a workshop bringing together leaders in the fields of military and commercial technology. The purpose of the meeting was to gain insight into the risks and vulnerabilities inherent in the use of information technology on the battlefield and in military systems.
Slandered and Helpless
Price: $6.87 USD. Words: 40,160. Language: American English. Published: February 6, 2015 by Dr. Leland Benton. Categories: Nonfiction » Computers and Internet » Security
Reputation Management: Slandered and Helpless - In Defense of Your Reputation Online & Offline is an eye-opening book into the world of cyber slander and cyber crime. In today’s cyber world millions of people worldwide are under assault by nefarious people – not just cyber criminals – as they stand by and witness online slander and reputation destruction with no end in sight or any legal remedy.
Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks
Price: $9.99 USD. Words: 53,070. Language: English. Published: January 11, 2015. Categories: Nonfiction » Politics and Current Affairs » Terrorism, Nonfiction » Computers and Internet » Security
The discovery of Stuxnet in 2010 was a milestone in the arena of cybersecurity because, although a malware attack on industrial control systems was long believed to be theoretically possible, it was different to see malware used in reality to cause real physical damage.
Cyber Operations and the Warfighting Functions - USCYBERCOM, Cyber Attacks and Cyber War, Distributed Denial of Service attack (DDoS), SCADA, Russian and Georgian Conflict, Hacktivism
Price: $1.99 USD. Words: 51,560. Language: English. Published: October 6, 2014. Categories: Nonfiction » Computers and Internet » Security
This strategic research paper utilizes the Estonia and Georgia cyber attacks to observe how cyber forces draw on the joint functions like a Brigade Combat Team or Air Expeditionary Wing uses the functions in their respective domains.
Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities
Price: $8.99 USD. Words: 122,250. Language: English. Published: August 22, 2014. Categories: Nonfiction » Computers and Internet » Security
This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it.
Cyber Security Planning Guide, Small Business Information Security Fundamentals - Privacy and Data Security, Scams and Fraud, Network Security, Website Security, Email, Mobile Devices, Employees
Price: $6.99 USD. Words: 69,900. Language: English. Published: August 15, 2014. Categories: Nonfiction » Business & Economics » Small business and entrepreneurship, Nonfiction » Computers and Internet » Security
This ebook reproduces two government documents with authoritative information for small businesses on cyber security and information security: Cyber Security Planning Guide and Small Business Information Security: The Fundamentals.
10 Things That Used to be Good Ideas in Data Security
Price: $5.99 USD. Words: 25,520. Language: English. Published: July 30, 2014. Categories: Nonfiction » Computers and Internet » Security
In 10 Things that Used to be Good Ideas in Data Security, author Mike Winkler discusses how we let old ideas, some of which used to be good, keep us from making the right decisions; social inertia meets the pace of unending change.
Beginner's Guide for Cybercrime Investigators
Price: $2.99 USD. Words: 30,100. Language: English. Published: June 17, 2014. Categories: Nonfiction » Computers and Internet » Security
Cybercrime is a phenomenon of our time, often reflected in the media. Forensic investigation of computer systems has a number of features that differentiate it fundamentally from other types of investigations. The computer itself is the main source of information for the investigator.
U.S. Army War College Information Operations Primer - Fundamentals of Information Operations - Botnet, Stuxnet, Cyber Warfare, NSA, Service Organizations
Price: $7.99 USD. Words: 61,440. Language: English. Published: May 9, 2014. Categories: Nonfiction » Computers and Internet » Security
This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels.
Big Data: Seizing Opportunities, Preserving Values - Report of the Presidential Big Data and Privacy Working Group, Internet, Computer, Online Communications Privacy Threats
Price: $1.99 USD. Words: 34,650. Language: English. Published: May 2, 2014. Categories: Nonfiction » Computers and Internet » Security
The review did not set out to answer every question about big data, nor was it intended to develop a comprehensive policy approach to big data. However, by evaluating the opportunities and challenges presented by big data, the working group was able to draw important conclusions and make concrete recommendations to the President for Administration attention and policy development.
Manualul investigatorului în criminalitatea informatic─â
Price: Free! Words: 43,680. Language: Romanian. Published: April 23, 2014. Categories: Nonfiction » Computers and Internet » Security
Ghid introductiv pentru aplicarea dispozitiilor legale referitoare la criminalitatea informatica.
CEH (Certified Ethical Hacker) : 100% iLLEGAL
Price: $4.99 USD. Words: 33,080. Language: English. Published: April 21, 2014. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Security / cryptography
This is a Un-official CEH (Certifited Ethical hacker Guide) that cover CEH module with easy-to-follow
Cyberspace Operations: What Senior Leaders Need to Know About Cyberspace - EMP, Catastrophic Events, Carrington Event, plus Resilient Military Systems and the Advanced Cyber Threat
Price: $5.99 USD. Words: 46,330. Language: English. Published: April 9, 2014. Categories: Nonfiction » Computers and Internet » Security
The Cyberspace Operations Group of the Center for Strategic Leadership, U.S. Army War College, conducted a three-day workshop to explore the cyberspace issues that should be addressed in senior service college-level education and similar senior leader education programs.