- African American fiction
- Alternative history
- Children’s books
- Coming of age
- Cultural & ethnic themes
- Fairy tales
- Gay & lesbian fiction
- Graphic novels & comics
- Humor & comedy
- Literary collections
- Mystery & detective
- Plays & Screenplays
- Science fiction
- Themes & motifs
- Thriller & suspense
- Transgressional fiction
- Visionary & metaphysical
- Women's fiction
- Young adult or teen
- Antiques & Collectibles
- Art, Architecture, Photography
- Business & Economics
- Career Guides
- Children's Books
- Comics (nonfictional)
- Computers & Internet
- Cooking, Food, Wine, Spirits
- Education & Study Guides
- Engineering, trades, & technology
- Gay & Lesbian
- General reference
- Health, wellbeing, & medicine
- Home & Garden
- Language Instruction
- Literary criticism
- New Age
- Politics & Current Affairs
- Relationships & Family
- Religion & Spirituality
- Science & Nature
- Sex & Relationships
- Social Science
- Sports & outdoor recreation
- True Crime
Games | Internet | Social networking | Security | Blogging | Computer science | Digital publishing | Software development & engineering / general | Web / site design | Computer literacy | Information technology | Enterprise IT management | All sub-categories >> Biography | Bioinformatics | Blogging | Buyer’s guides | Calculators | CD-DVD technology | Certification guides / A+ | Certification guides / MCSE | Client-server computing | Compilers | Computer aided design | Computer engineering | Computer graphics | Computer literacy | Computer science | Computer simulation | Computer vision & pattern recognition | Cybernetics | Data modeling & design | Data processing | Data storage | Data transmission systems / broadband | Data transmission systems / electronic data interchange | Data transmission systems / general | Data transmission systems / wireless | Database management | Database management / data mining | Database management / data warehousing | Desktop applications / databases | Desktop applications / email clients | Desktop applications / personal finance applications | Desktop applications / presentation software | Desktop applications / project management software | Desktop applications / spreadsheets | Desktop applications / suites | Desktop applications / word processing | Desktop publishing | Digital media / audio | Digital media / general | Digital photography | Digital publishing | Document management | Documentation & technical writing | ebook readers | Educational software | Electronic commerce | Enterprise applications / business intelligence tools | Enterprise applications / collaboration software | Enterprise applications / general | Enterprise IT management | Expert systems | Games | Graphics & design | Hardware | Hardware / handheld devices | Hardware / mainframes & minicomputers | Hardware / network hardware | Hardware / peripherals | Hardware / personal computers / general | Hardware / personal computers / Macintosh | Hardware / personal computers / PCs | History | Home automation | HTML | Image processing | Information technology | Information theory | Intelligence (AI) & semantics | Interactive & multimedia | Internet | Internet / application development | Internet / security | Keyboarding | Logic design | Machine theory | Mathematical & statistical software | Microprocessors | Natural language processing | Networking | Networking / intranets & extranets | Networking / network protocols | Networking / security | Networking / vendor specific | Neural networks | Office productivity applications | Online services / general | Online services / resource directories | Open source | Operating systems | Optical data processing | Podcasting | Programming | Reference | Security | Security / cryptography | Security / viruses | Social aspects / general | Social aspects / human-computer interaction | Social networking | Software development & engineering / general | Software development & engineering / project management | Software development & engineering / systems analysis & design | Software Development & Engineering / Tools | Speech & audio processing | System administration / disaster & recovery | System administration / email administration | System administration / general | System administration / Linux & UNIX administration | System administration / Windows administration | Systems architecture / distributed systems & computing | Systems architecture / general | Training & certification | User interfaces | Utilities | Video production | Virtual worlds | Web / browsers | Web / general | Web / page design | Web / search engines | Web / site design | Web / site directories | Web / user generated content | Web integration | XML | << Top sub-categories
Do Innovative Thinkers Pose an Increased Insider Threat?: A Preliminary Analysis - Unintentional Insider Threats (UIT), Risk Taking, Mental Health Issues, Disgruntlement Traits, Cyber Security Threats by Progressive Management
Price: $6.99 USD. Words: 28,500. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
The malicious insider threat is one of the most nefarious of potential cyber security breaches. There have been egregious insider data thefts in the last 10 years within the government. The Unintentional Insider Threat (UIT)—the individual who is incompetent or careless and accidentally divulges sensitive information—is also a major concern.
Artificial Intelligence (AI) Applications for Automated Battle Management Aids (ABMA) in Future Military Endeavors - Tactical Decision Making, Battlespace Knowledge and Awareness, Prioritize Resources by Progressive Management
Price: $6.99 USD. Words: 30,340. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Intelligence (AI) & semantics, Nonfiction » History » Military
Tactical environments can become highly complex in terms of threats, the tempo of events, the element of surprise or unexpected events, the limits of battlespace awareness, and the potential deadly consequences. This type of environment translates into a highly challenging decision space for tactical warfighters. Tactical decision-making tasks quickly surpass the cognitive abilities of humans.
Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity by Progressive Management
Price: $6.99 USD. Words: 29,130. Language: English. Published: August 24, 2019. Categories: Nonfiction » Computers & Internet » Networking / security, Nonfiction » Computers & Internet » Security
The purpose of this research is to investigate, design and implement a statistical analysis-based insider threat detection product deployable to resource-disadvantaged systems and provide organizations with a method for baselining the network profiles and host activities unique to their operational environments.
A Study on Ad hoc on-Demand Distance Vector(AODV) Protocol by R Patel
Price: Free! Words: 2,140. Language: English. Published: August 21, 2019. Categories: Nonfiction » Computers & Internet » Computer science
AODV is a very simple, efficient, and effective routing protocol for Mobile Ad hoc Net works which do not have fixed topology. This algorithm was motivated by the limited bandwidth that is available in the media that are used for wireless communications. It borrows most of the advantageous concepts from DSR and DSDV algorithms.
Awareness of Sim Swap Attack by R Patel
Price: Free! Words: 1,520. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Cybernetics
This paper presents the awareness of Sim Swap attack among people and prevention of this attack, where the fraud person will Gain the personal information of person from different ways like fake call , sms ,Email, link, social media etc. mobile number is linked with bank and adhaar card the fraud person will gain the access of Bank account,
Internet of Things(IoT) in HealthCare by R Patel
Price: Free! Words: 1,430. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
IoT is a modest way to elevate our production and yield with the help of internet. We can supervise and control and communicate with the help of internet. Internet Of Things imagines a future physical and digital entities are to be linked by proper information and communication technologies which will sanction new class of applications and services.
Age invariant face recognition by R Patel
Price: Free! Words: 2,240. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer science
Face recognition across age progression is remains one of the areas most challenging tasks now a days, as the aging process affects both the shape and texture of a face. One possible solution is to apply a probabilistic model to represent a face simultaneously with its identity variable, which is stable through time, and its aging variable, which changes with time.
A Survey Paper on Identity Theft in the Internet by R Patel
Price: Free! Words: 1,350. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
Identity of any internet user is stole in seconds and the user may not aware about it. There are various tools available in the internet which allow anyone to steal data of any particular user, if he she is connected to internet. The attacker is not required to have advanced knowledge about the internet technology or how networking works.
IoT Based Home Automation System Over Cloud by R Patel
Price: Free! Words: 2,090. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
Internet of Things IoT is a system of interrelated computing devices where all the things, including every physical object, can be connected making those objects intelligent, programmable and capable of interacting with humans. As more and more data are generated each day, IoT and its potential to transform how we communicate with machines and each other can change the world.
WSN based Temperature Monitoring System for Multiple Locations in Industry by R Patel
Price: Free! Words: 2,330. Language: English. Published: August 20, 2019. Categories: Nonfiction » Computers & Internet » Computer engineering
Wireless sensor network technology has demonstrated a great potential for industrial, commercial, and consumer applications. Speci cally, in process monitoring and control, process data such as pressure, humidity, temperature, ow, level, viscosity,
Ciberseguridad al alcance de todos by David Pereira
Price: $5.99 USD. Words: 21,310. Language: Spanish. Published: August 19, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Education & Study Guides » Computers & technology
Este libro explica la Ciberseguridad dirigida a todos los públicos, de manera simple, sencilla, en lenguaje coloquial y ameno, con el objetivo de concientizar y mostrar a las personas cómo incrementar su nivel de seguridad y tranquilidad en el momento de usar cualquiera de sus dispositivos, ya sea que esté navegando en internet, usando su correo electrónico o comprando un artículo en línea.
Make Mobile App In A Day by Amit Kumar
Price: $4.99 USD. Words: 8,660. Language: English. Published: August 16, 2019. Categories: Nonfiction » Computers & Internet » Software Development & Engineering / Tools
Lets make an app which will run on iOS and android OS at the same time. We will learn to program a mobile app once and can deploy on Apple iStore or Google Play. We will get the taste of best of both the worlds. So lets get started with building our first app. Let' s make an app in a day. Are you ready and excited to focus your day through completing your first app in a day.
URL Masking by Telly Frias Cordero, Jr
Price: $0.99 USD. Words: 1,930. Language: English. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Networking / security
URL Masking may be implemented on an e-commerce website where we purchase certain goods and services or be designed to receive money. A masked link can take us anywhere on the web and we are often guided by influencers or popular content to click on these links.
ENMASCARAMIENTO DE UN ENLACE O URL MASKING by Telly Frias Cordero, Jr
Price: $0.99 USD. Words: 2,320. Language: Spanish. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Networking / security
De hecho, hay demasiado contenido en las redes sociales, que incluye los hiperenlaces que manipulan enmascarandose como otras direcciones web. No obstante, hay que reconocer que nosotros estamos siendo dirigidos por los miles de millones de usuarios en internet.
Data Warehousing by PRANAV TRIPATHI
Price: $2.59 USD. Words: 34,080. Language: English. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Database management / data warehousing, Nonfiction » Computers & Internet » Database management / data mining
Including basics of SQL and Informatica PowerCenter along with interview questions and sample scripts.
Foundations of QUBIT Construction -Hardware and Software -A Bit = Welcome To The Fantastic World of Nils Bohr. No Wait-NOreally! by Christian Kiss
Price: $99.00 USD. Words: 46,660. Language: English. Published: August 14, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general, Nonfiction » Computers & Internet » Logic design
QUBIT construction fails because of misunderstood physics and electron. Here are the necessary paradigm shifts as well as the direct path to implement FUNCTIONAL QUBITS. The Axioms include reinvented new physics principles. Instead of processing on off functions, instead of building binary gates and switches around this binary system,
Scrum Framework - For Course IS467 Agile Development Methodologies by Mohammed Musthafa Soukath Ali
Price: $3.99 USD. Words: 22,860. Language: English. Published: August 13, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general
This book is a custom version of "Scrum Narrative" specifically intended for Boston University students for their course IS467 Agile Development Methodologies by Ralph Covino, Ph.D. In addition to the introduction of Scrum, the book delves deeper into the finer aspects of Scrum, which is required for applying Scrum on the ground.
The Marmo Method Modelbuilding Guide #9: From An E-Book To A Hard Copy (or How To Print A PDF) by Richard Marmo
Price: $0.99 USD. Words: 2,780. Language: English. Published: August 12, 2019 by Rincom Productions. Categories: Nonfiction » Home & Garden » Crafts & Hobbies, Nonfiction » Computers & Internet » ebook readers
The ninth installment of The Marmo Method Modelbuilding Guide series is specifically designed for the modelbuilder who needs to print a few reference pages from an e-book while working on their latest masterpiece. Or who prefers to turn the entire e-book into a hard copy to relax with instead of staring at a computer or phone screen.
BluePrint for Software Engineering by Prakash Hegade
Price: Free! Words: 6,000. Language: English. Published: August 11, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general, Nonfiction » Computers & Internet » Computer science
Well, here is a sloth friend who will sit with you for hours and hours and teach you some underlying philosophy of design and its principles. It’s going to be slow. Like already said, sloth slow. But my friend, that is how you will do it. That is how you will master it. That is how you will get to the foundations of it.