- African American fiction
- Alternative history
- Children’s books
- Coming of age
- Cultural & ethnic themes
- Fairy tales
- Gay & lesbian fiction
- Graphic novels & comics
- Humor & comedy
- Literary collections
- Mystery & detective
- Plays & Screenplays
- Science fiction
- Themes & motifs
- Thriller & suspense
- Transgressional fiction
- Visionary & metaphysical
- Women's fiction
- Young adult or teen
- Antiques & Collectibles
- Art, Architecture, Photography
- Business & Economics
- Career Guides
- Children's Books
- Comics (nonfictional)
- Computers & Internet
- Cooking, Food, Wine, Spirits
- Education & Study Guides
- Engineering, trades, & technology
- Gay & Lesbian
- General reference
- Health, wellbeing, & medicine
- Home & Garden
- Language Instruction
- Literary criticism
- New Age
- Politics & Current Affairs
- Relationships & Family
- Religion & Spirituality
- Science & Nature
- Sex & Relationships
- Social Science
- Sports & outdoor recreation
- True Crime
Games | Internet | Social networking | Security | Blogging | Computer science | Digital publishing | Software development & engineering / general | Web / site design | Computer literacy | Information technology | Enterprise IT management | All sub-categories >> Biography | Bioinformatics | Blogging | Buyer’s guides | Calculators | CD-DVD technology | Certification guides / A+ | Certification guides / MCSE | Client-server computing | Compilers | Computer aided design | Computer engineering | Computer graphics | Computer literacy | Computer science | Computer simulation | Computer vision & pattern recognition | Cybernetics | Data modeling & design | Data processing | Data storage | Data transmission systems / broadband | Data transmission systems / electronic data interchange | Data transmission systems / general | Data transmission systems / wireless | Database management | Database management / data mining | Database management / data warehousing | Desktop applications / databases | Desktop applications / email clients | Desktop applications / personal finance applications | Desktop applications / presentation software | Desktop applications / project management software | Desktop applications / spreadsheets | Desktop applications / suites | Desktop applications / word processing | Desktop publishing | Digital media / audio | Digital media / general | Digital photography | Digital publishing | Document management | Documentation & technical writing | ebook readers | Educational software | Electronic commerce | Enterprise applications / business intelligence tools | Enterprise applications / collaboration software | Enterprise applications / general | Enterprise IT management | Expert systems | Games | Graphics & design | Hardware | Hardware / handheld devices | Hardware / mainframes & minicomputers | Hardware / network hardware | Hardware / peripherals | Hardware / personal computers / general | Hardware / personal computers / Macintosh | Hardware / personal computers / PCs | History | Home automation | HTML | Image processing | Information technology | Information theory | Intelligence (AI) & semantics | Interactive & multimedia | Internet | Internet / application development | Internet / security | Keyboarding | Logic design | Machine theory | Mathematical & statistical software | Microprocessors | Natural language processing | Networking | Networking / intranets & extranets | Networking / network protocols | Networking / security | Networking / vendor specific | Neural networks | Office productivity applications | Online services / general | Online services / resource directories | Open source | Operating systems | Optical data processing | Podcasting | Programming | Reference | Security | Security / cryptography | Security / viruses | Social aspects / general | Social aspects / human-computer interaction | Social networking | Software development & engineering / general | Software development & engineering / project management | Software development & engineering / systems analysis & design | Software Development & Engineering / Tools | Speech & audio processing | System administration / disaster & recovery | System administration / email administration | System administration / general | System administration / Linux & UNIX administration | System administration / Windows administration | Systems architecture / distributed systems & computing | Systems architecture / general | Training & certification | User interfaces | Utilities | Video production | Virtual worlds | Web / browsers | Web / general | Web / page design | Web / search engines | Web / site design | Web / site directories | Web / user generated content | Web integration | XML | << Top sub-categories
Breaking Stovepipes: Bridging Gaps in Air Force Industrial Control Systems Management to Enable Multi-Domain Mission Assurance - Improperly Organized for Missions Across Air, Space, and Cyberspace by Progressive Management
Price: $6.99 USD. Words: 20,650. Language: English. Published: July 26, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Cybernetics
Air Force doctrine inadequately addresses Industrial Control Systems (ICS) security and as a result, the service is improperly organized and trained to secure missions across the domains of air, space, and cyberspace. In response, the Air Force must consider significant changes at the strategic, operational, and tactical levels to provide mission assurance to commanders.
Blockchains in National Defense: Trustworthy Systems in a Trustless World - The Evolving Cyber Threat, Air Force Should Research and Develop Blockchain Technology to Reduce Probability of Compromise by Progressive Management
Price: $6.99 USD. Words: 24,010. Language: English. Published: July 26, 2019. Categories: Nonfiction » Computers & Internet » Security / cryptography, Nonfiction » Computers & Internet » Security / viruses
The ability of the USAF to prevail in the highly contested environment of 2040 will be dictated by its ability to defend cyber-enabled systems, and the data within them, from compromise and manipulation. Yet contemporary cyber defense is faltering, and incremental improvements seem unlikely to overcome an exponentially growing cyber threat.
Phaser III Game Prototyping by Stephen Gose
Essential Guide to Air Force Cyberspace: 50 Cyber Questions Every Airman Can Answer, Airpower Lessons for an Air Force Cyber-Power Targeting Theory, Conceptualizing Cyber Intelligence, ISR, USCYBERCOM by Progressive Management
Price: $7.99 USD. Words: 80,880. Language: English. Published: July 25, 2019. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces four important government documents and reports dealing with the scientific and technical angle of flying, fighting and winning in cyberspace.
Phaser III Game Design Workbook by Stephen Gose
NEWLY updated 4th edition with Phaser v3.16+ examples. This is a different book format for game development -- unlike anything you have seen. LeanPub edition is always the most up to date edition.
An Antifragile Approach to Preparing for Cyber Conflict - Historical Analogies, Current U.S. National Cyber Strategic Approach, Probability and Consequence of Positive and Negative Black Swan Events by Progressive Management
Price: $4.99 USD. Words: 21,980. Language: English. Published: July 24, 2019. Categories: Nonfiction » Computers & Internet » Security / viruses, Nonfiction » Computers & Internet » Security
"Defense" of any system against all highly improbable, but significant events, what are sometimes referred to as Black Swan events, is not possible. These events are, by their very nature unpredictable and uncertain, which is why they so dominate our thinking, and our culture.
Big Data by Nicolae Sfetcu
Price: $2.99 USD. Words: 63,810. Language: English. Published: July 22, 2019. Categories: Nonfiction » Computers & Internet » Data processing, Nonfiction » Computers & Internet » Internet
Big Data devine în același timp o amenințare și o oportunitate în ceea ce privește gestionarea și utilizarea acestor date, menținând în același timp drepturile persoanelor implicate.
Windows 10 2019 Users Guide: The Beginner to Expert Guide to Master the Windows 10 like a Pro and Troubleshoot Common Problems by Kenneth Stone
Price: $3.50 USD. Words: 24,190. Language: English. Published: July 18, 2019 by Gretchen Ramos. Categories: Nonfiction » Computers & Internet » System administration / Windows administration, Nonfiction » Computers & Internet » Desktop applications / word processing
Windows 10 2019 Comprehensive Manual. The Beginner to Expert Guide Windows 10 is the most powerful operating system that Microsoft has ever made, but it's also the most complex. While the user interface is extremely intuitive, you'll have to dig a little deeper to customize your experience, get maximum performance and make the most of features.
China, the United States, and Next Generation Connectivity - 5th Generation Wireless Technology (5G), Internet of Things (IOT) Standards and Technology Development, Huawei and ZTE Security Controversy by Progressive Management
Price: $7.99 USD. Words: 68,960. Language: English. Published: July 14, 2019. Categories: Nonfiction » History » Asian, Nonfiction » Computers & Internet » Internet / security
This is an important report compilation of testimony at a 2018 hearing which compared and contrasted U.S. and Chinese pursuit of next generation connected devices and networks and the implications for U.S. economic competitiveness and national security. The hearing focused on U.S. and Chinese 5th generation wireless technology (5G) and Internet of Things standards and technology development.
Zero Days, One Obligation - Cyberspace Computer Software Vulnerability Disclosure Policy by the U.S. Government, Cyberethics and the Roles of Morality, Utilitarianism, Strategic and National Interests by Progressive Management
Price: $7.99 USD. Words: 38,590. Language: English. Published: June 22, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
These vulnerabilities can be understood as errors in coding that are potentially exploitable and unknown to either the creators or users of the software. If attack vectors related to zero-day vulnerabilities are completely dependent upon correctable coding errors, what should policy require when the U.S. government detects a zero-day vulnerability?
All Prime Numbers from 1-1000000 (And the Java code used to find them) by Max Mercer
Price: Free! Words: 79,100. Language: English. Published: June 3, 2019. Categories: Nonfiction » Reference » Handbooks & Manuals, Nonfiction » Computers & Internet » Calculators
This book is a reference book for Mathematicians everywhere. It includes all prime numbers between 1 and 1000000 and the Java code that I used to find them, along with suggestions for code manipulation in order to find prime numbers with more than 7 digits.
O Livro de Notas de Lain - 3ª Ed by Lain Samui
You set the price! Words: 25,270. Language: Portuguese. Published: May 30, 2019. Categories: Nonfiction » Computers & Internet » History
Uma trajetória de mais de 7 anos de blog na deepweb. Um documento histórico da cultura cypherpunk. Esse livro pode ser seu pelo preço que quiser pagar, grátis incluso. Considere atribuir algum valor justo e contribuir com o trabalho de Lain, que é sem precedentes.
Java Beginner:How To Master Coding Skills by MOHMAD YAKUB
Price: $4.75 USD. Words: 74,340. Language: English (Indian dialect). Published: May 30, 2019. Categories: Nonfiction » Computers & Internet » Programming
This book is s to fill the much-needed gap especially for:- Who is unaware of any approach to build programming logic? Who had a hard time learning to program? Who are teachers/trainers and want to create interest in the subject of programming for their students. Who carries the false notion that coding is only for super smart people. Who is a victim of discouragement comments?
Natural Language Processing by Ajit Singh
Price: $3.00 USD. Words: 24,820. Language: English. Published: May 30, 2019. Categories: Nonfiction » Computers & Internet » Natural language processing
Key Features: 1. Discussion of the main problems involved in language processing. 2. Discussion of morphology, concentrating mainly on English morphology with the concept of a lexicon in an NLP. 3. Introduces some simple statistical techniques and illustrates their use in NLP . 4. DIY Corpus 5. Semantics and Pragmatics 6. NLP With Python
Aviation Artificial Intelligence: How Will it Fare in the Multi-Domain Environment? Unmanned Aerial Vehicles (UAVs) and Drones, Piloted Aircraft Risks, Autonomous Aircraft Benefits, Human - AI Teaming by Progressive Management
Price: $6.99 USD. Words: 28,560. Language: English. Published: May 8, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Intelligence (AI) & semantics
As the Army prepares itself to fight in the Multi-Domain Battle environment, it must assume that enemies will contest every domain and units will operate in more austere conditions, both physically and informationally. Increased sensor capabilities, proliferated and dispersed air defense systems, and contested electromagnetic spectrums challenge the air domain.
The Book of Melee by Edwin Budding
You set the price! Words: 48,450. Language: English. Published: May 8, 2019. Categories: Nonfiction » Computers & Internet » Games
The Book of Melee dives into the history of the competitive Super Smash Bros. Melee community. Written by Edwin Budding, the creator of Monday Morning Marth and the Melee Stats Podcast, The Book of Melee follows Melee's greatest players and leaders through their collective efforts to support the scene's survival for over nearly two decades, from crowded restaurant basements to sold out arenas.
2019 American Broadband Initiative Milestones Report - New Investments in Rural Internet Service Broadband Deployment, Expedited Access to Federal Assets in Priority Markets, Streamlining Permitting by Progressive Management
Price: $5.99 USD. Words: 26,560. Language: English. Published: April 30, 2019. Categories: Nonfiction » Computers & Internet » Internet, Nonfiction » Computers & Internet » Online services / general
This report outlines a vision for how the Federal Government can increase broadband access and actions that Agencies are taking to increase private-sector investment in broadband. Previous attempts to expand broadband connectivity have made progress and provided valuable lessons that guide this Initiative.
2019 Cybersecurity Readiness Review - Secretary of the Navy: After Significant Naval Data Losses, Five Critical Pillars - Culture, People, Structure, Processes, and Resources Battling Cyber Threats by Progressive Management
Price: $6.99 USD. Words: 41,700. Language: English. Published: April 28, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
This report is in response to the request of the Secretary of the Navy to conduct an independent Cybersecurity Readiness Review following the loss of significant amounts of Department of the Navy data.
Python 101: Learn Python 3 From Scratch by Mihai Catalin Teodosiu
Price: $4.99 USD. Words: 61,350. Language: English. Published: April 16, 2019. Categories: Nonfiction » Computers & Internet » Programming, Nonfiction » Computers & Internet » Programming
The "Python 101: Learn Python 3 From Scratch" book is aimed at anyone having little or no experience in coding and a great desire to start learning Python from scratch. This hands-on training takes you from "Hello World!" to intermediate and advanced Python topics in no time.
Saudi Arabia's "Permeable" Internet ICT (Information and Communications Technology) - Examination of Chinese "Closed" Internet Restrictions Compared to U.S. "Open" Web, Saudi Diversification by Progressive Management
Price: $6.99 USD. Words: 40,040. Language: English. Published: April 9, 2019. Categories: Nonfiction » History » Middle East, Nonfiction » Computers & Internet » Internet
Both China and the United States have political and economic interests in "winning" the internet governance debate. Today, due to the political, social, and economic dynamics inherent in authoritarian countries across the globe, more of these governments may accept and use the China internet model, thereby forcing the U.S. to acknowledge the legitimacy of a censored and filtered internet.