Books tagged: cyber security

These results show books which have been specifically tagged with this keyword. You can also try doing a general search for the term "cyber security" .
You can also limit results to books that contain two tags.
Try one of these commonly-used combinations:
Some content may be filtered out. To view such content, change your filtering option.

Found 49 results

Сделай свой компьютер стабильнее и быстрее: Что Майкрософт забыла вам сказать
Price: Free! Words: 16,970. Language: Russian. Published: February 6, 2019. Categories: Nonfiction » Computers & Internet » System administration / general, Nonfiction » Computers & Internet » Computer literacy
Для большинства пользователей ПК сложно остановиться на каком-либо конкретном плане выявления и устранения неисправностей, который можно использовать регулярно. Данная брошюра содержит краткое изложение ключевых моментов, которые могут служить в качестве основы для технического обслуживания и устранения неполадок вашего ПК, а также помогут сделать компьютер стабильнее и быстрее.
The Web Paige Chronicles
Price: $4.95 USD. Words: 33,480. Language: English. Published: November 17, 2018. Categories: Fiction » Young adult or teen » Social Issues
Wilhelmina Evangeline Beatriz Paige is better known as “Web” to her friends because of her seemingly endless knowledge of computers. Always eager to lend a hand, she takes pride in helping the “technically-challenged” in her neighborhood as part of her “pay-it-forward” philosophy.
Cyber Security for Critical Energy Infrastructure - Enhancing Electrical Grid Security, Attacks on Ukrainian and Western Energy Sectors, Critical Infrastructure Management, Safeguards, Mitigation
Price: $6.99 USD. Words: 32,250. Language: English. Published: November 10, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Engineering, trades, & technology » Power Resources / Electrical
The United States power grid is a logical target for a major cyber attack because it connects all of the nation's critical infrastructures with electricity. Attackers consistently exploit vulnerabilities of the bulk power system and are close to being able to disrupt electrical distribution.
Online Hacker Survival Guide
Price: $3.99 USD. Words: 5,610. Language: English. Published: October 23, 2018. Categories: Nonfiction » Computers & Internet » Data storage, Nonfiction » Computers & Internet » Online services / general
The 21st century is not only an era of technical and computer innovations but the time when each of us can face a hackers’ attack. You may have noticed that your computer started acting unusual, for example, suddenly opened a CD drive or launched programs without any command. Such a weirdness can be explained by system mistakes, but it’s also likely to be outer intervention to your computer system
The Enigma Factor
Series: The Enigma Series. Price: $2.99 USD. Words: 111,820. Language: English. Published: October 13, 2018. Categories: Fiction » Science fiction » High tech, Fiction » Thriller & suspense » Action & suspense
The Enigma Factor brings relevant technology elements of programming, encryption, crypto-currency, identity theft, and hacking to highlight the professional excellence of Jacob, more so perhaps due to his sheltered upbringing. Explore the horrific damage cyber criminals can inflict as these authors weave a complex tale of danger, intrigue, and international cyber combat
Christian in a Thousand Words: Q
Price: Free! Words: 2,020. Language: English. Published: July 3, 2018 by WHO SHALL UNLOCK?. Categories: Essay » Literature, Essay » Technology
"The wolf also shall dwell with the lamb, and the leopard shall lie down with the kid; and the calf and the young lion and the fatling together; and a little child shall lead them." --Isaiah 11:6 Isaiah 11:6 11 + 6 = 17 17 = Q Q = Q Gospel = Oral Traditions On earth as it is in heaven = Lion/Lamb = NSA/144,000 Christians sacrificing their privacy for humankind = Wolf & Lamb both TRANSPARENT.
Time Sensitivity in Cyberweapon Reusability - Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
Price: $8.99 USD. Words: 28,320. Language: English. Published: June 24, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Computers & Internet » Security / viruses
A cyberweapon is weaponized software code that exploits flaws in software. It is only effective if the flaw still exists at the time of weapon deployment. Because of this, there is only a small window of time in which a particular cyberweapon can be used. Many argue that cyberweapons can only be effectively used once, and that after first use, the vulnerability will be patched.
Deterring Cyberattacks on U.S. Critical Infrastructure - Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services
Price: $7.99 USD. Words: 28,480. Language: English. Published: June 24, 2018. Categories: Nonfiction » History » Military, Nonfiction » Computers & Internet » Security
Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public.
U.S. Customs and Border Protection Cybersecurity Strategy: Enabling the Mission Through Secure Technology - Engaging the Workforce in the Broader Cybersecurity Vision
Price: $2.99 USD. Words: 17,700. Language: English. Published: June 5, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Politics & Current Affairs » Government
In safeguarding America's borders and promoting economic prosperity, U.S. Customs and Border Protection connects its employees to a secure cyberspace network containing sensitive, mission critical information. With CBP's expansion in technology and connectivity over the past 10 years, employees are able to more effectively carry out their duties.
National Cyber Incident Response Plan - Cybersecurity Federal Roles and Responsibilities - Response To, and Recovery From, Significant Cyber Attacks Posing Risks to Critical Infrastructure Systems
Price: $8.99 USD. Words: 35,370. Language: English. Published: June 3, 2018. Categories: Nonfiction » Computers & Internet » Security, Nonfiction » Politics & Current Affairs » Current affairs
Networked technologies touch every corner of the globe and every facet of human life. They have driven innovation, nurtured freedoms, and spurred economic prosperity. Even so, the very technologies that enable these benefits offer new opportunities for malicious and unwanted cyber activities.