- African American fiction
- Alternative history
- Children’s books
- Coming of age
- Cultural & ethnic themes
- Fairy tales
- Gay & lesbian fiction
- Graphic novels & comics
- Humor & comedy
- Literary collections
- Mystery & detective
- Plays & Screenplays
- Science fiction
- Themes & motifs
- Thriller & suspense
- Transgressional fiction
- Visionary & metaphysical
- Women's fiction
- Young adult or teen
- Antiques & Collectibles
- Art, Architecture, Photography
- Business & Economics
- Career Guides
- Children's Books
- Comics (nonfictional)
- Computers & Internet
- Cooking, Food, Wine, Spirits
- Education & Study Guides
- Engineering, trades, & technology
- Gay & Lesbian
- General reference
- Health, wellbeing, & medicine
- Home & Garden
- Language Instruction
- Literary criticism
- New Age
- Politics & Current Affairs
- Relationships & Family
- Religion & Spirituality
- Science & Nature
- Sex & Relationships
- Social Science
- Sports & outdoor recreation
- True Crime
Games | Internet | Social networking | Security | Blogging | Computer science | Digital publishing | Software development & engineering / general | Web / site design | Computer literacy | Information technology | Enterprise IT management | All sub-categories >> Biography | Bioinformatics | Blogging | Buyer’s guides | Calculators | CD-DVD technology | Certification guides / A+ | Certification guides / MCSE | Client-server computing | Compilers | Computer aided design | Computer engineering | Computer graphics | Computer literacy | Computer science | Computer simulation | Computer vision & pattern recognition | Cybernetics | Data modeling & design | Data processing | Data storage | Data transmission systems / broadband | Data transmission systems / electronic data interchange | Data transmission systems / general | Data transmission systems / wireless | Database management | Database management / data mining | Database management / data warehousing | Desktop applications / databases | Desktop applications / email clients | Desktop applications / personal finance applications | Desktop applications / presentation software | Desktop applications / project management software | Desktop applications / spreadsheets | Desktop applications / suites | Desktop applications / word processing | Desktop publishing | Digital media / audio | Digital media / general | Digital photography | Digital publishing | Document management | Documentation & technical writing | ebook readers | Educational software | Electronic commerce | Enterprise applications / business intelligence tools | Enterprise applications / collaboration software | Enterprise applications / general | Enterprise IT management | Expert systems | Games | Graphics & design | Hardware | Hardware / handheld devices | Hardware / mainframes & minicomputers | Hardware / network hardware | Hardware / peripherals | Hardware / personal computers / general | Hardware / personal computers / Macintosh | Hardware / personal computers / PCs | History | Home automation | HTML | Image processing | Information technology | Information theory | Intelligence (AI) & semantics | Interactive & multimedia | Internet | Internet / application development | Internet / security | Keyboarding | Logic design | Machine theory | Mathematical & statistical software | Microprocessors | Natural language processing | Networking | Networking / intranets & extranets | Networking / network protocols | Networking / security | Networking / vendor specific | Neural networks | Office productivity applications | Online services / general | Online services / resource directories | Open source | Operating systems | Optical data processing | Podcasting | Programming | Reference | Security | Security / cryptography | Security / viruses | Social aspects / general | Social aspects / human-computer interaction | Social networking | Software development & engineering / general | Software development & engineering / project management | Software development & engineering / systems analysis & design | Software Development & Engineering / Tools | Speech & audio processing | System administration / disaster & recovery | System administration / email administration | System administration / general | System administration / Linux & UNIX administration | System administration / Windows administration | Systems architecture / distributed systems & computing | Systems architecture / general | Training & certification | User interfaces | Utilities | Video production | Virtual worlds | Web / browsers | Web / general | Web / page design | Web / search engines | Web / site design | Web / site directories | Web / user generated content | Web integration | XML | << Top sub-categories
iOS 13, iPadOS 13, tvOS 13, and watchOS 6 for Users by Wayne Dixon
Price: $3.99 USD. Words: 84,370. Language: English. Published: September 20, 2019. Categories: Nonfiction » Computers & Internet » Operating systems
iOS 13 and iPadOS 13 are huge releases and you can read all about what is new for users. Some topics covered include Sidecar, Apple Arcade, external storage. Besides this you can also read about changes with tvOS 13, like multiple users, and watchOS 6's new watch faces and noise app.
iOS 13, iPadOS 13, tvOS 13, and watchOS 6 for Developers by Wayne Dixon
Price: $3.99 USD. Words: 37,560. Language: English. Published: September 20, 2019. Categories: Nonfiction » Computers & Internet » Programming
iOS 13 and iPadOS 13 provide huge opportunities for developers to bring new and exciting features to their users. Learn all about Swift 5 and the all new SwiftUI and Combine frameworks as well as bringing iPad apps to the Mac and even more.
30 Day Blackout by Stacy Jagger
Price: $8.99 USD. Words: 42,230. Language: English. Published: September 16, 2019. Categories: Nonfiction » Computers & Internet » Social aspects / general, Nonfiction » Parenting » Childhood development
It’s no secret that devices are designed to be addictive. If your kids spend more time looking at screens than making eye contact, they’re not alone; they’re in the majority. Screens have taken the place of connecting person-to-person, in real time. Countless children are experiencing depression, anxiety, listlessness, suicidal thoughts, aggression, hyperactivity — here's how you stop the cycle.
Your Safety and Privacy Online: The CIA and NSA by Siggi Bjarnason
Price: $9.99 USD. Words: 38,980. Language: English. Published: September 13, 2019. Categories: Nonfiction » Computers & Internet » Internet / security
This book is all about all the sharks, thieves, and criminals you are bound to run into online, how to recognize them and avoid them. It's about how to stay safe online in today's ever-increasing online world filled with cybercrime. It aims to teach folks that aren't necessarily all that computer savvy how to limit their exposure online and reduce the risk of becoming a victim of cybercrime.
All About Android 10 by Dario Cerezo
Price: $5.99 USD. Words: 21,610. Language: English. Published: September 13, 2019. Categories: Nonfiction » Computers & Internet » Operating systems
Android 10 is Google's latest flavor of Android with all sorts of new features, including a brand-new gesture navigation system, new UI elements, and a heap of under-the-hood tweaks that aim to make this the best version of Android to date.
The 5G Ecosystem: Risks & Opportunities for DoD, National Security Implications of Fifth Generation (5G) Mobile Technologies, Network Reliability and Security Risks to Emerging 5G Wireless Networks by Progressive Management
Price: $7.99 USD. Words: 49,270. Language: English. Published: September 13, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Telecommunications
Three important federal government papers have been professionally converted for accurate flowing-text e-book format reproduction: (a) The 5G Ecosystem: Risks & Opportunities for DoD; (b) National Security Implications of Fifth Generation (5G) Mobile Technologies; (c) Network Reliability and Security Risks to Emerging 5G Wireless Networks.
2019 Cybersecurity and Infrastructure Security: Risks Introduced by 5G Adoption in U.S.; Insider Threat Programs for Critical Manufacturing Sector; Strategic Intent, Election Security, Urgent Threats by Progressive Management
Price: $4.99 USD. Words: 29,620. Language: English. Published: September 12, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Telecommunications
This important compilation of three 2019 cybersecurity papers has been professionally converted for accurate flowing-text e-book format reproduction: (a) Overview of Risks Introduced by 5G Adoption in the United States; (b) Insider Threat Programs for the Critical Manufacturing Sector Implementation Guide; and (c) Strategic Intent: "Defend Today, Secure Tomorrow".
Python and Algorithmic Thinking for the Complete Beginner (2nd Edition): Learn to Think Like a Programmer by Aristides S. Bouras
Price: $9.99 USD. Words: 172,890. Language: English. Published: September 12, 2019. Categories: Nonfiction » Computers & Internet » Programming, Nonfiction » Computers & Internet » Programming
Addressed to anyone who has no prior programming knowledge or experience. This book is ideal for: - novices or average programmers, for self-study - high school students - first-year college or university students - teachers - professors - anyone who wants to start learning or teaching computer programming using the proper conventions and techniques
Cyberish by Rakhi R Wadhwani
Price: $8.90 USD. Words: 62,270. Language: English. Published: September 4, 2019 by Wordit CDE. Categories: Nonfiction » Computers & Internet » Cybernetics
Cybercrime is a relatively new concern for all of us. As the number of computer owners connected to the internet increases, so too does the opportunity for cybercrime. To fully understand the development of cybercrime one must study the language and culture ofthe internet as well as the pathways that connect users from around the world.
Cybersecurity Risk Management Process for Unmanned Aerial Systems (UAS) at the Strategic Level - Increasing Use of Commercial Off-the-Shelf (COTS), Joint Risk Analysis Methodology (JRAM) Process by Progressive Management
Price: $6.99 USD. Words: 24,310. Language: English. Published: September 2, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
In the last decade, the integration of unmanned aerial systems (UAS) into military operations has grown substantially. UAS have significantly contributed to U.S. military tactical, operational and strategic operations.
Red Team in a Box (RTIB): Developing Automated Tools to Identify, Assess, and Expose Cybersecurity Vulnerabilities in Department of the Navy Systems - Cyberspace Operations and Cyber Kill Chain by Progressive Management
Price: $6.99 USD. Words: 30,360. Language: English. Published: September 1, 2019. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
As malicious actors advance their capabilities to exploit and penetrate computer networks, the Department of the Navy (DoN) must be able to verify whether or not its computer systems are susceptible to cyber-attacks. A current mitigation technique is to use a cyber red team to assess a friendly network in a controlled environment.
Écrire un livre entier sur iPad avec Scrivener by Gaelle Kermen
Series: Guide Kermen Collection Pratique. Price: $5.55 USD. Words: 36,500. Language: French. Published: September 1, 2019 by Marie-Helene Le Doze. Categories: Nonfiction » Computers & Internet » Buyer’s guides, Nonfiction » Computers & Internet » Computer literacy
Aux écrivains, scénaristes, journalistes, avocats, universitaires, étudiants, élèves, Aux auteurs qui désirent écrire et publier, En édition traditionnelle ou indépendante, Depuis iPad et iPhone avec Scrivener iOS, Pour garder la fraîcheur de l'inspiration en liberté.
Cloud Computing Interview Questions You'll Most Likely Be Asked: Second Edition by Vibrant Publishers
Series: Job Interview Questions Series. Price: $9.99 USD. Words: 25,690. Language: English. Published: August 29, 2019. Categories: Nonfiction » Computers & Internet » Client-server computing, Nonfiction » Computers & Internet » Online services / general
• 225 Cloud Computing Interview Questions • 77 HR Interview Questions • Real life scenario-based questions • Strategies to respond to interview questions • 2 Aptitude Tests
Do Innovative Thinkers Pose an Increased Insider Threat?: A Preliminary Analysis - Unintentional Insider Threats (UIT), Risk Taking, Mental Health Issues, Disgruntlement Traits, Cyber Security Threats by Progressive Management
Price: $6.99 USD. Words: 28,500. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » History » Military
The malicious insider threat is one of the most nefarious of potential cyber security breaches. There have been egregious insider data thefts in the last 10 years within the government. The Unintentional Insider Threat (UIT)—the individual who is incompetent or careless and accidentally divulges sensitive information—is also a major concern.
Artificial Intelligence (AI) Applications for Automated Battle Management Aids (ABMA) in Future Military Endeavors - Tactical Decision Making, Battlespace Knowledge and Awareness, Prioritize Resources by Progressive Management
Price: $6.99 USD. Words: 30,340. Language: English. Published: August 25, 2019. Categories: Nonfiction » Computers & Internet » Intelligence (AI) & semantics, Nonfiction » History » Military
Tactical environments can become highly complex in terms of threats, the tempo of events, the element of surprise or unexpected events, the limits of battlespace awareness, and the potential deadly consequences. This type of environment translates into a highly challenging decision space for tactical warfighters. Tactical decision-making tasks quickly surpass the cognitive abilities of humans.
Bifrost: A Statistical Analysis Framework for Detecting Insider Threat Activities on Cyber Systems - Monitoring Network Resources Against Hosts Who Exhibit Threat Characteristics of Insider Activity by Progressive Management
Price: $6.99 USD. Words: 29,130. Language: English. Published: August 24, 2019. Categories: Nonfiction » Computers & Internet » Networking / security, Nonfiction » Computers & Internet » Security
The purpose of this research is to investigate, design and implement a statistical analysis-based insider threat detection product deployable to resource-disadvantaged systems and provide organizations with a method for baselining the network profiles and host activities unique to their operational environments.
Ciberseguridad al alcance de todos by David Pereira
Price: $5.99 USD. Words: 21,310. Language: Spanish. Published: August 19, 2019. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Education & Study Guides » Computers & technology
Este libro explica la Ciberseguridad dirigida a todos los públicos, de manera simple, sencilla, en lenguaje coloquial y ameno, con el objetivo de concientizar y mostrar a las personas cómo incrementar su nivel de seguridad y tranquilidad en el momento de usar cualquiera de sus dispositivos, ya sea que esté navegando en internet, usando su correo electrónico o comprando un artículo en línea.
Data Warehousing by PRANAV TRIPATHI
Price: $2.59 USD. Words: 34,080. Language: English. Published: August 15, 2019. Categories: Nonfiction » Computers & Internet » Database management / data warehousing, Nonfiction » Computers & Internet » Database management / data mining
Including basics of SQL and Informatica PowerCenter along with interview questions and sample scripts.
Foundations of QUBIT Construction -Hardware and Software -A Bit = Welcome To The Fantastic World of Nils Bohr. No Wait-NOreally! by Christian Kiss
Price: $99.00 USD. Words: 46,660. Language: English. Published: August 14, 2019. Categories: Nonfiction » Computers & Internet » Software development & engineering / general, Nonfiction » Computers & Internet » Logic design
QUBIT construction fails because of misunderstood physics and electron. Here are the necessary paradigm shifts as well as the direct path to implement FUNCTIONAL QUBITS. The Axioms include reinvented new physics principles. Instead of processing on off functions, instead of building binary gates and switches around this binary system,