Nonfiction » Computers & Internet » Security

7 Rules to Influence Behaviour and Win at Cyber Security Awareness
Price: $5.50 USD. Words: 20,570. Language: English. Published: October 23, 2019. Categories: Nonfiction » Computers & Internet » Internet / security, Nonfiction » Computers & Internet » Security
Cyber Security explained in non-cyber language! A Cyber book for everyone! Most cyber incidents are caused by human errors and mistakes, not complicated technical exploits. This book provides a proven process to effectively communicate cyber security, and create awareness to reduce cyber breaches by addressing the human factor. It does so without relying on scary numbers or techie jargon!
The 5G Ecosystem: Risks & Opportunities for DoD, National Security Implications of Fifth Generation (5G) Mobile Technologies, Network Reliability and Security Risks to Emerging 5G Wireless Networks
Price: $7.99 USD. Words: 49,270. Language: English. Published: September 13, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Telecommunications
Three important federal government papers have been professionally converted for accurate flowing-text e-book format reproduction: (a) The 5G Ecosystem: Risks & Opportunities for DoD; (b) National Security Implications of Fifth Generation (5G) Mobile Technologies; (c) Network Reliability and Security Risks to Emerging 5G Wireless Networks.
2019 Cybersecurity and Infrastructure Security: Risks Introduced by 5G Adoption in U.S.; Insider Threat Programs for Critical Manufacturing Sector; Strategic Intent, Election Security, Urgent Threats
Price: $4.99 USD. Words: 29,620. Language: English. Published: September 12, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Telecommunications
This important compilation of three 2019 cybersecurity papers has been professionally converted for accurate flowing-text e-book format reproduction: (a) Overview of Risks Introduced by 5G Adoption in the United States; (b) Insider Threat Programs for the Critical Manufacturing Sector Implementation Guide; and (c) Strategic Intent: "Defend Today, Secure Tomorrow".
Cybersecurity Risk Management Process for Unmanned Aerial Systems (UAS) at the Strategic Level - Increasing Use of Commercial Off-the-Shelf (COTS), Joint Risk Analysis Methodology (JRAM) Process
Price: $6.99 USD. Words: 24,310. Language: English. Published: September 2, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
In the last decade, the integration of unmanned aerial systems (UAS) into military operations has grown substantially. UAS have significantly contributed to U.S. military tactical, operational and strategic operations.
Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain
Price: $6.99 USD. Words: 30,360. Language: English. Published: September 1, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
As malicious actors advance their capabilities to exploit and penetrate computer networks, the Department of the Navy (DoN) must be able to verify whether or not its computer systems are susceptible to cyber-attacks. A current mitigation technique is to use a cyber red team to assess a friendly network in a controlled environment.
Do Innovative Thinkers Pose an Increased Insider Threat?: A Preliminary Analysis - Unintentional Insider Threats (UIT), Risk Taking, Mental Health Issues, Disgruntlement Traits, Cyber Security Threats
Price: $6.99 USD. Words: 28,500. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
The malicious insider threat is one of the most nefarious of potential cyber security breaches. There have been egregious insider data thefts in the last 10 years within the government. The Unintentional Insider Threat (UIT)—the individual who is incompetent or careless and accidentally divulges sensitive information—is also a major concern.
Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity
Price: $6.99 USD. Words: 29,130. Language: English. Published: August 24, 2019. Categories: Nonfiction » Computers & Internet » Networking / security, Nonfiction » Computers & Internet » Security
The purpose of this research is to investigate, design and implement a statistical analysis-based insider threat detection product deployable to resource-disadvantaged systems and provide organizations with a method for baselining the network profiles and host activities unique to their operational environments.
Ciberseguridad al alcance de todos
Price: $5.99 USD. Words: 21,310. Language: Spanish. Published: August 19, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Education & Study Guides » Computers & technology
Este libro explica la Ciberseguridad dirigida a todos los públicos, de manera simple, sencilla, en lenguaje coloquial y ameno, con el objetivo de concientizar y mostrar a las personas cómo incrementar su nivel de seguridad y tranquilidad en el momento de usar cualquiera de sus dispositivos, ya sea que esté navegando en internet, usando su correo electrónico o comprando un artículo en línea.
The Best Defense is a Good Offense: Conducting Offensive Cyberoperations and the Law of Armed Conflict - Four Types: Data Destruction, Generating Bogus Network Traffic, Altering Data, Denying Service
Price: $4.99 USD. Words: 22,720. Language: English. Published: August 9, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
Four major types of offensive cyberoperations include destroying data on a network or a system connected to a network, being an active member of a network and generating bogus traffic, clandestinely altering data in a database stored on a network and degrading or denying service on a network.
Cyberwar: Are Civilians Back on the Battlefield - Cyberspace Challenges Current Law of Armed Conflict (LOAC) Paradigm, Targeting Civilians by Computer is a More Efficient and Less Violent Tactic
Price: $4.99 USD. Words: 21,830. Language: English. Published: August 3, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
The growth of cyberspace is posing challenges to many aspects of the international system and foremost among them is the current Law of Armed Conflict (LOAC) paradigm. While humanitarian concerns have strongly influenced recent LOAC development, state interests—and not humanitarian concerns—ultimately determine how states conduct war.
Organizing, Training, and Retaining Intelligence Professionals for Cyber Operations - NSA and Air Force Cyberspace Landscape, ISR, Equipping ISR Pros to Win in Cyberspace, Preserving the Advantage
Price: $5.99 USD. Words: 22,240. Language: English. Published: July 30, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
The U.S. Department of Defense's recent growth in cyber has outpaced the Air Force's ability to adequately organize, train and retain cyber expertise. This is especially true within Air Force intelligence, a critical component of the Department's Cyber Mission Force.
Total Army Cyber Mission Force (CMF): Reserve Component Integration - Buckshot Yankee Cyberspace Military Exercise, Mission Areas and Initiatives for Training, Development and Integration of RC Forces
Price: $5.99 USD. Words: 23,240. Language: English. Published: July 28, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
As cyberspace continues to play an important role in projection of military power, in an environment where the mission of tomorrow is ill defined and budgets are becoming constrained, there is an increasing need for a Total Force (AC/RC) concept.
An Antifragile Approach to Preparing for Cyber Conflict - Historical Analogies, Current U.S. National Cyber Strategic Approach, Probability and Consequence of Positive and Negative Black Swan Events
Price: $4.99 USD. Words: 21,980. Language: English. Published: July 24, 2019. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » Computers & Internet » Security
"Defense" of any system against all highly improbable, but significant events, what are sometimes referred to as Black Swan events, is not possible. These events are, by their very nature unpredictable and uncertain, which is why they so dominate our thinking, and our culture.
Zero Days, One Obligation - Cyberspace Computer Software Vulnerability Disclosure Policy by the U.S. Government, Cyberethics and the Roles of Morality, Utilitarianism, Strategic and National Interests
Price: $7.99 USD. Words: 38,590. Language: English. Published: June 22, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
These vulnerabilities can be understood as errors in coding that are potentially exploitable and unknown to either the creators or users of the software. If attack vectors related to zero-day vulnerabilities are completely dependent upon correctable coding errors, what should policy require when the U.S. government detects a zero-day vulnerability?
2019 Cybersecurity Readiness Review - Secretary of the Navy: After Significant Naval Data Losses, Five Critical Pillars - Culture, People, Structure, Processes, and Resources Battling Cyber Threats
Price: $6.99 USD. Words: 41,700. Language: English. Published: April 28, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
This report is in response to the request of the Secretary of the Navy to conduct an independent Cybersecurity Readiness Review following the loss of significant amounts of Department of the Navy data.
Bits and Bullets: Cyber Warfare in Military Operations - Framework for Military Planners to Envision Ways Cyberspace Can Impact the Battlefield, Hypothetical Conflict in Korea as Thought Experiment
Price: $6.99 USD. Words: 36,670. Language: English. Published: March 21, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
Experts have been predicting the onset of cyber warfare for decades. Yet, despite the relative ease and anonymity with which cyber-attacks can be conducted on military targets, the preponderance of historical cyber-related actions has been largely confined to the realms of espionage and crime.
Applying Lessons Learned from Interwar Airpower (1919-1939) to Joint Warfighting With Cyberpower - Change Agents Moffett, Patrick, Reeves; Army and Navy Doctrine, Personnel, and Technology
Price: $5.99 USD. Words: 33,600. Language: English. Published: March 5, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
The United States has yet to use cyberwarfare in a major conflict, and the military services have differing ideas on what role cyberwarfare will play in America's next war. In addition, the services have unique and often contradictory perspectives on how they see the employment of cyberwarfare in military operations, and this conflict may affect combatant commanders' ability to employ cyberpower.
U.S. Army Concept for Cyberspace and Electronic Warfare (EW) Operations 2025-2040 (TRADOC 525-8-6) - Electromagnetic Spectrum Management, Threats from Hackers, Bot Nets, Phishers, Foreign Intelligence
Price: $5.99 USD. Words: 26,890. Language: English. Published: February 3, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
The U.S. Army is the Nation's principal land force organized, trained, and equipped for prompt and sustained combat on land. Today's adversaries have studied how the U.S. Joint Force prefers to operate and have adapted by developing capabilities that contest U.S. operations on land, at sea, in the air, in space, and in cyberspace, as well as across the electromagnetic spectrum.
Cyber Power: Attack and Defense Lessons from Land, Sea, and Air Power - Estonia and Georgia Cyber Conflicts, Through the Lens of Fundamental Warfighting Concepts Like Initiative, Speed, and Mobility
Price: $8.99 USD. Words: 58,900. Language: English. Published: January 24, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
Cyberspace is the newest warfighting domain, but heretofore it has been the nearly exclusive purview of technical experts, not warfighters. Consequently, much of the work on cyber power theory has eschewed the traditional concepts and lexicon of war in favor of language more familiar to technical experts in information communications technology.
Cyber Security for Critical Energy Infrastructure - Enhancing Electrical Grid Security, Attacks on Ukrainian and Western Energy Sectors, Critical Infrastructure Management, Safeguards, Mitigation
Price: $6.99 USD. Words: 32,250. Language: English. Published: November 10, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Power Resources / Electrical
The United States power grid is a logical target for a major cyber attack because it connects all of the nation's critical infrastructures with electricity. Attackers consistently exploit vulnerabilities of the bulk power system and are close to being able to disrupt electrical distribution.

Related Categories