Nonfiction » Computers and Internet » Security

Programmatic Integration of Cyber into the Institutional Domain of Leader Development - Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation
Price: $7.99 USD. Words: 30,850. Language: English. Published: May 12, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This study assesses the institutional domain of leader development in relation to cyberspace education and the implications of poorly integrating cyberspace into leader development. Cyberspace plays an integral role in communications, information, electricity, economics, and our nation's defense.
IT Infrastructure Risk & Vulnerability Library: A Consolidated Register of Operational and Technology Infrastructure Vulnerabilities for IT Assurance Professionals
Price: $65.95 USD. Words: 21,750. Language: English. Published: May 9, 2018. Categories: Nonfiction » Computers and Internet » Networking / security, Nonfiction » Computers and Internet » Security
"IT Infrastructure Risk & Vulnerability Library" is a library that captured the most critical risks, vulnerabilities and control lapses associated with major IT infrastructure/assets used in today organizations to support the business. IT Auditors, Risk Managers and IT Security/Control Professionals can used this book to perform audit or security assessment of their IT assets and for remediation
Auditing your Payment Cards Processes, Systems and Applications: A Step By Step PCIDSS Compliant Audit Program (A Practical Guide for Payment Card Brand, Issuers, Acquirers, Processors and Switches)
Price: $45.95 USD. Words: 10,000. Language: English. Published: May 7, 2018. Categories: Nonfiction » Business & Economics » Auditing, Nonfiction » Computers and Internet » Security
"Auditing your Payment Cards Processes, Systems and Applications" is a guide book that provide IT Assurance professionals step by step information on how to carry out security audit of payment card infrastructure (systems and applications) in line with PCIDSS requirement. Internal Security Assessor (ISA) and QSA can use this book to prepare or assess their organization for PCIDSS compliance.
Crash Course Data Security
Price: $2.99 USD. Words: 6,450. Language: English. Published: May 3, 2018 by Can Akdeniz. Categories: Nonfiction » Computers and Internet » Security
Everything comes with its advantages and disadvantages just like the digital world. The invention of the digital world took us all by surprise and now has become an integral part of our lives. It is almost impossible to think of a world without the internet, social media and or electronic gadgets.
Android: Keeping you Secure
Price: $2.99 USD. Words: 6,900. Language: English. Published: April 22, 2018. Categories: Nonfiction » Computers and Internet » Security
Android: Keeping you Secure is a practical and step by step guide to securing your Android device. This book focuses on explaining Android security measures, why they are important to you and how to implement them on your device. Contains information on lock screens, encryption, Android Device Manager, Two Factor Authenticator, Application Security and Wireless Network Security.
Facebook: Keeping you Secure
Price: $2.99 USD. Words: 8,810. Language: English. Published: April 18, 2018. Categories: Nonfiction » Computers and Internet » Security
Facebook: Keeping you Secure is a practical and step by step guide to securing your Facebook account. Some topics are Account security, Login Alerts and Approvals, Setting up Friend Lists, Hiding Profile Information, Cleaning up Past Timeline Posts and Securing Future Profile Information. Each section is explained in detail with step-by-step instructions and screen shots to make the process easy.
Bitcoin – Security and Privacy
Price: $1.99 USD. Words: 17,550. Language: English. Published: March 21, 2018. Categories: Nonfiction » Computers and Internet » Security
As an electronic currency, Bitcoin is often presented as both anonymous and perfectly transparent. Where the truth really lies depends on how you use it. "Bitcoin – Security and Privacy" explains how to safely store and buy Bitcoin, how to use it efficiently, privately or transparently.
Vapor: A True Story of How I Fell Victim to Catfishing
Price: $7.99 USD. Words: 47,670. Language: English. Published: January 30, 2018 by Post Hill Press. Categories: Nonfiction » Biography » Personal memoir, Nonfiction » Computers and Internet » Security
If you are on the Internet in any way, you are a target for cybercrime.
Auditing Your Windows Infrastructure, Intranet And Internet Security: A Practical Audit Program for Assurance Professionals
Price: $21.95 USD. Words: 10,390. Language: English. Published: January 21, 2018. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Business & Economics » Auditing
"Auditing Your Windows Infrastructure, Intranet and Internet Security" is a guide book that provide IT Assurance professionals step by step information on how to carry out security audit of Windows infrastructure, their organization's intranet network and interface with the internet. Assurance professional can use this book to draw up a robust security assessment program for their organization.
Online Safety: Scams, SPAM, Viruses and Clouds
Price: Free! Words: 16,050. Language: British English. Published: December 19, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Education and Study Guides » Computers & technology
Have you ever received a phone call informing you that you have a virus on your computer, or a slow Internet connection? Have you ever wondered why you get so much SPAM? Are you concerned your computer might end up with a virus and you'll lose all your files? Does anyone know what the Cloud actually is?
Your Amazing Itty Bitty® Personal Data Protection Book
Price: $2.99 USD. Words: 4,380. Language: English. Published: November 30, 2017 by S & P Productions, Inc.. Categories: Nonfiction » Computers and Internet » Security
It’s more important than ever to begin and maintain good practices on a daily basis and to know what to do if you suspect your personal information has been misused. This handy guide shows you how. to protect your social security accounts in case your number is exposed or misused. Detect the signs that indicate someone is trying to steal your bank account and take appropriate action. Pick up a cop
Putin's Kremlin - Epicenter of Global Cyber Warfare
Price: $4.99 USD. Words: 13,490. Language: English. Published: June 8, 2017. Categories: Nonfiction » Politics and Current Affairs » World leaders, Nonfiction » Computers and Internet » Security
Putin's Kremlin - Epicenter of Global Cyber Warfare: This goal of this eBook is provide a wake-up call for the new US government’s executive leadership, however well intentioned, yet seemingly naïve, that Russian cyber warfare is a clear and present danger to national security. Key topics include An Historical Primer on Russia' Leaders, Putin’s Pathology, The Era of Cyber Warfare.
For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
Price: $6.99 USD. Words: 37,560. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Networking / security
This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force.
Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data
Price: $7.99 USD. Words: 21,720. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists.
Impact of Alleged Russian Cyber Attacks - Weakness of Cyber Defenses Against Cyber Warfare Demonstrated by High-Profile Attacks Against Estonia and Georgia, Multilateral Initiatives, Countermeasures
Price: $6.99 USD. Words: 30,540. Language: English. Published: March 22, 2017. Categories: Nonfiction » History » Russian, Nonfiction » Computers and Internet » Security
When countries or organizations stand in opposition to Russia they are likely to receive a cyber attack in order to influence their position. The high likelihood of future cyber attacks, the ease of conducting cyber attacks, and the amount of networks to conduct the attacks make this monograph relevant for study.
2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution
Price: $5.99 USD. Words: 26,740. Language: English. Published: March 6, 2017. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This is a complete reproduction of the final report of the Defense Science Board Task Force on Cyber Deterrence released in late February 2017. The Task Force was asked to consider the requirements for deterrence of the full range of potential cyber attacks against the United States.
Army Cyber Mission Force - Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices
Price: $6.99 USD. Words: 25,350. Language: English. Published: February 25, 2017. Categories: Nonfiction » Computers and Internet » Security
Assessing the Army's model for recruiting, retaining, and organizing a Cyber Mission Force required a number of steps. First, it was necessary to understand the unique generational and character traits for those drawn to highly technical fields.
National Guard Forces in the Cyber Domain - Integrating the Guard into National Cyber Forces and Defenses, Cybersecurity Protecting Critical Infrastructure from Hactivists and Terrorist Groups
Price: $5.99 USD. Words: 30,210. Language: English. Published: February 23, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Today the nation faces the new challenge of how to best defend itself against cyber attacks. Just as the militia, forbearers to the National Guard, enabled George Washington's attack against Trenton, the National Guard stands ready today to work with Department of Defense (DoD) to counter the growing cyber threat.
Cyber Attacks, Attribution, and Deterrence: Case Studies – Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure as Vital to National Security
Price: $6.99 USD. Words: 30,880. Language: English. Published: February 17, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
The purpose of this monograph is to examine the role of a defender's ability to attribute a cyber attack and its effect on deterrence. Conflict in cyberspace is constantly evolving and deterrence might provide stability and understanding of these conflicts.
Building a Life and Career in Security
Price: $2.99 USD. Words: 11,030. Language: English. Published: February 17, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Career Guides » Computer Science
As I’ve looked at my own path and helped others along their journey, there is a framework for success in information security. My goal in writing this book is give you the confidence to grow your own career in information security. I’ve analyzed my career and the careers of others to design a plan to build a successful career in information security.

Related Categories