Nonfiction » Computers and Internet » Security

Cyberspace Operations: What Senior Leaders Need to Know About Cyberspace - EMP, Catastrophic Events, Carrington Event, plus Resilient Military Systems and the Advanced Cyber Threat
By Progressive Management
Price: $5.99 USD. Words: 46,330. Language: English. Published: April 9, 2014. Category: Nonfiction » Computers and Internet » Security
The Cyberspace Operations Group of the Center for Strategic Leadership, U.S. Army War College, conducted a three-day workshop to explore the cyberspace issues that should be addressed in senior service college-level education and similar senior leader education programs.
Legality in Cyberspace: An Adversary View - Russian Cyberspace Conflict Concepts and Initiatives, Russia Military and Domestic Applications, Internet Security Threats
By Progressive Management
Price: $7.99 USD. Words: 109,500. Language: English. Published: April 5, 2014. Category: Nonfiction » Computers and Internet » Security
This detailed analysis is an essential guide to the mindset of an important cyber actor, Russia, and one which it is essential for the United States to understand.
The Core Of Hacking
By Rahul Dwivedi
Price: $9.99 USD. Words: 40,400. Language: English. Published: March 19, 2014. Category: Nonfiction » Computers and Internet » Security
How to Become an Ethical Hacker & What will You get from This Book ? Hack any web mail accounts Yahoomail, Gmail. Hotmail; Hack Windows Administrator Password; Hack face book account; Learn how Phishing is done; Hack & Crack Wi-Fi (WLAN) Secured Network; Purchase any item through web based marketing site in just 1 USD; Learn How to secure your network, system and data; And many more things.......
Email Security in Persian Language
By rajarayaneh
Price: Free! Words: 24,770. Language: Persian. Published: February 19, 2014. Category: Nonfiction » Computers and Internet » Security
درباره این کتاب: این کتاب به مسئله امنیت پست الکترونیکی می‌پردازد. ابتدا مفاهیم پست الکترونیکی و نحوه عملکرد پست الکترون‌یکی را خواهیم آموخت. در ادامه مخاطرات پست الکترونیکی، معرفی شده و به نحوه ایمن سازی آنها اشاره خواهیم کرد. از ویژگی‌های مهم این کتاب، ارائه روشی نوین برای ارزیابی مخاطرات پست الکترونیکی و همچنین، ایمن سازی مخاطرات پست الکترونیکی، بر اساس نوع سازمان می‌باشد. بر اساس این کتاب، مقا
Sudo Mastery: User Access Control for Real People
By Michael W Lucas
Price: $9.99 USD. Words: 33,830. Language: English. Published: October 29, 2013 by Tilted Windmill Press. Category: Nonfiction » Computers and Internet » Security
Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. Sudo lets you divide root’s monolithic power between the people who need it, with accountability and auditability. While many people use sudo, most use only a small part of it’s features. Master sudo with Sudo Mastery.
Identity Theft in the Cyber Age
By Ronald J. Leach
Price: $5.99 USD. Words: 36,800. Language: English. Published: August 1, 2013. Category: Nonfiction » Business & Economics » Personal finance
This book, written by a well-known and extensively published computer scientist who has lectured and consulted for many years on identity theft, will show you how to avoid the most common mistakes consumers make in their everyday lives. The many illustrations and real-lfe examples will pay for this book a hundred-fold.
Military Cyber Attacks and America's Vulnerable Nuclear Weapons and Defenses: DoD Task Force Report on Resilient Military Systems and the Advanced Cyber Threat
By Progressive Management
Price: $9.99 USD. Words: 37,800. Language: English. Published: May 28, 2013. Category: Nonfiction » Computers and Internet » Security
This is a vital 2013 report from the U.S. Defense Department warning of serious cyber threats to the military, including the critical nuclear weapons infrastructure. The report addresses the risk of catastrophic cyber attacks and discusses the need for offensive operations.
IT Auditing: Assuring Information Assets Protection
By Robert E. Davis
Series: IT Auditing, Book 2. Price: $59.95 USD. Words: 75,740. Language: English. Published: March 17, 2012. Category: Nonfiction » Computers and Internet » Security
"IT Auditing: Assuring Information Assets Protection" provides a proven approach to assessing IT security frameworks, architectures, methods, and techniques.
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
By Michael W Lucas
Price: $9.99 USD. Words: 36,320. Language: English. Published: January 19, 2012 by Tilted Windmill Press. Category: Nonfiction » Computers and Internet » System administration / general
0.75 star(4.63 from 8 reviews)
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job. This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. Master SSH with SSH Mastery.
Scamming Exposed
By Dennis Edim
Price: $60.00 USD. Words: 153,930. Language: English. Published: January 17, 2012. Category: Nonfiction » Computers and Internet » Security
This book a chronicle of the activities, tricks of internet scammers to serve as warnings and danger signals to would be victims of this costly cyber business. This book has successfully exposed the tricks behind scamming and the nefarious activities of those behind this multibillion dollar internet business deal.The author strikes an important note to victims and would be victims of cyber fraud.
How Not To Use Your Smartphone
By Rodney D. Cambridge
Price: $2.99 USD. Words: 29,740. Language: English. Published: January 2, 2012. Category: Nonfiction » Computers and Internet » Security
Identity thieves can do an awful lot of bad once they have your personal information. In this book, computer security expert Rod Cambridge exposes the dangers of getting hacked and being made a victim of identity theft through your smartphone. Rod also provides practical solutions, tips, and advice to help stop the bad guys making you a victim of various types of fraud all through your phone.
Identity Theft Today And The Internet
By Jacqui Harris
Price: $2.49 USD. Words: 37,820. Language: English. Published: November 1, 2011. Category: Nonfiction » Computers and Internet » Security
Identity theft and the Internet are more pervasive today than ever. Learning how to avoid identity theft and recognize the different forms of it are critical.
Active Regulation: General Systems Design Principles
By Gerald M. Weinberg
Series: Systems Thinking, Book 3. Price: $9.99 USD. Words: 65,680. Language: English. Published: June 6, 2011. Category: Nonfiction » Computers and Internet » Security
Active Regulation is Volume 3 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" The second and third books tackle the next question, namely "Why do things stay the same?
Passive Regulation: General Systems Design Principles
By Gerald M. Weinberg
Series: Systems Thinking, Book 2. Price: $9.99 USD. Words: 61,070. Language: English. Published: June 3, 2011. Category: Nonfiction » Computers and Internet » Security
Passive Regulation is Volume 2 in the General Systems Thinking series that begins with the world-wide best-selling, An Introduction to General Systems Thinking. (also available in ebook formats) That first series volume focused on the question,"Why do we see what we see?" This second books tackles the next question, namely "Why do things stay the same?"
Cyberspace Cybersecurity: First American International Strategy for Cyberspace, White House and GAO Reports and Documents, Internet Data Security Protection, International Web Standards
By Progressive Management
Price: $9.99 USD. Words: 61,100. Language: English. Published: May 18, 2011. Category: Nonfiction » Politics and Current Affairs » Current affairs
On May 16, 2011, the White House announced what it called the United States’ first comprehensive International Strategy for Cyberspace. This impressive compilation has over 200 pages of official government reports and documents, including the complete White House cyberspace strategy document and supporting materials and much more.
Consumer Guide to Computer Security: Fight Back Against Identity Theft, Malware, Hackers, Spyware, Spam, Botnets, Phishing - Online Privacy - Wireless, Laptop, Hotspot Security
By Progressive Management
Price: $9.99 USD. Words: 165,120. Language: English. Published: May 16, 2011. Category: Nonfiction » Computers and Internet » Security
Information for consumers includes fighting back against identity theft, how identity theft occurs, procedures to follow for victims, email scams, botnets, hackers and spam, health online, home wireless security, identity theft, internet auctions, kids' privacy, laptop security, malware, online shopping, P2P security, phishing, spyware, tax-related id theft, voip, wi-fi hotspots, and more.
2011 Guide to Data Security and Mobile Privacy Issues: Data Theft Hearings and FTC Reports, Online Threats, Identity Theft, Phishing, Internet Security, Malware, Cyber Crime
By Progressive Management
Price: $9.99 USD. Words: 165,250. Language: English. Published: May 16, 2011. Category: Nonfiction » Computers and Internet » Security
Comprehensive coverage of all aspects of data security and mobile privacy issues, including the prevention of data theft. This impressive compilation has over 500 pages of official government reports and documents, including testimony at hearing held on these vital matters.
Unmasked
By Ars Technica
Price: $1.99 USD. Words: 25,410. Language: English. Published: March 9, 2011. Category: Nonfiction » Politics and Current Affairs » Activism
How the Internet vigilantes of Anonymous took on a computer security firm, spilled its secrets to the world, and got the attention of Congress--all to keep their own identities a secret.
Ensuring Information Assets Protection
By Robert E. Davis
Price: $36.24 USD. Words: 35,010. Language: English. Published: February 14, 2011. Category: Nonfiction » Computers and Internet » Security
“Ensuring Information Assets Protection” presents a proven approach to deploying entity-centric IT security frameworks, architectures, methods, and techniques. In terms of content, this publication converts selected standards and guidelines into practical applications using detailed examples and conceptual graphics.
OWNED: Why hacking continues to be a problem
By Mister Reiner
Price: $9.99 USD. Words: 32,260. Language: English. Published: May 8, 2010. Category: Nonfiction » Computers and Internet » Security
Unlike what most people are led to believe, the hacking problem is not just about hackers and security vulnerabilities. Get an insider’s perspective on computer security and hacking, to learn some of the hidden reasons why hackers have an advantage over their security counterparts. Can the world ever be free of hackers given today’s technology? The answer to this question may surprise you.