Books tagged: computer security

The adult filter is active; there may be additional content. To view this content, click the "Adult Content" button above to change your filtering option.

Found 35 results

For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
Price: $6.99 USD. Words: 37,560. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Networking / security
This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force.
Social Media: The Fastest Growing Vulnerability to the Air Force Mission - Cyberspace Issues, Facebook, LinkedIn, Twitter, Cybersecurity, Bring Your Own Device (BYOD), Safeguarding Personal Data
Price: $7.99 USD. Words: 21,720. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Social media is the fastest growing vulnerability to the military mission and the personal security of all Airmen. On 30 November 2014, the FBI issued warning to members of the US military and requested that they review their social media presence for any information like names and addresses that might attract the attention of violent ISIS extremists.
2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution
Price: $5.99 USD. Words: 26,740. Language: English. Published: March 6, 2017. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This is a complete reproduction of the final report of the Defense Science Board Task Force on Cyber Deterrence released in late February 2017. The Task Force was asked to consider the requirements for deterrence of the full range of potential cyber attacks against the United States.
Army Cyber Mission Force - Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices
Price: $6.99 USD. Words: 25,350. Language: English. Published: February 25, 2017. Categories: Nonfiction » Computers and Internet » Security
Assessing the Army's model for recruiting, retaining, and organizing a Cyber Mission Force required a number of steps. First, it was necessary to understand the unique generational and character traits for those drawn to highly technical fields.
Adapting Unconventional Warfare Doctrine to Cyberspace Operations: Examination of Hacktivist Based Insurgencies - Cyber Warfare Roles of Russia, China, Analysis of 2014 Hong Kong Umbrella Revolution
Price: $6.99 USD. Words: 34,660. Language: English. Published: January 24, 2017. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This study proposes how cyberspace operations can best support online resistance movements to influence adversary national will or affect political behavior to achieve U.S. strategic objectives.
Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM)
Price: $5.99 USD. Words: 32,290. Language: English. Published: December 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » European
Defining and understanding what constitutes a cyber-attack is a complicated matter, largely due to the fact that there has not yet been a large-scale cyber-attack upon any nation.
Adware and Spyware
Price: $5.99 USD. Words: 9,650. Language: English. Published: November 12, 2016. Categories: Nonfiction » Computers and Internet » Security / viruses
Spyware and adware are two different animals.  Each has the ability to make your life a mess.  If you rely on the internet for anything or you rely on your computer for anything, it is a must that you fully understand what these things are and how they work. The first key to protecting yourself from these things is to fully understand what they are.
The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
Price: $5.99 USD. Words: 32,670. Language: English. Published: October 3, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination.
Examining Cyber Command Structures - History of Air and Space Domains, Nuclear Weapons Mission, Alternative Force Structures for Cyber Command and Control (C2), USCYBERCOM
Price: $5.99 USD. Words: 26,430. Language: English. Published: October 2, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
As the Department of Defense executes its mission in its newest warfare domain, cyberspace, some have questioned its choices with regard to command and control of its cyber forces. This thesis examines historical cases of new warfare domains and how the Department of Defense structured the command and control elements of its forces dedicated to the air and space domains.
Cyberspace Command and Control Model: The Nature of Cyberspace, Computer Networks, Information Environment, Internet, Data Manipulation, Legal Authorities, Cyber Attack, Cybernetics, Systems Theory
Price: $4.99 USD. Words: 28,700. Language: English. Published: September 18, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Cybernetics
As the nation's most technologically advanced service, the Air Force relies absolutely on cyberspace to perform its war-fighting missions. Underpinning this competency is the ability to command and control cyberspace operations, something the authors argue is in need of a fresh approach if the Air Force is to effectively fly, fight, and win in cyberspace.