Books tagged: cyber security

The adult filter is active; there may be additional content. To view this content, click the "Adult Content" button above to change your filtering option.

Found 32 results

For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
Price: $6.99 USD. Words: 37,560. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Networking / security
This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force.
Army Cyber Mission Force - Ambitions and Realities: Recruiting, Retaining, and Organizing Personnel, Getting the Best and the Brightest, Need to Depart from Standard Army Personnel Practices
Price: $6.99 USD. Words: 25,350. Language: English. Published: February 25, 2017. Categories: Nonfiction » Computers and Internet » Security
Assessing the Army's model for recruiting, retaining, and organizing a Cyber Mission Force required a number of steps. First, it was necessary to understand the unique generational and character traits for those drawn to highly technical fields.
Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM)
Price: $5.99 USD. Words: 32,290. Language: English. Published: December 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » European
Defining and understanding what constitutes a cyber-attack is a complicated matter, largely due to the fact that there has not yet been a large-scale cyber-attack upon any nation.
Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea
Price: $7.99 USD. Words: 41,180. Language: English. Published: November 29, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur.
Bitcoin Digital Currency and Blockchain Technology: Disruptive Computer Technology, Movement of Money, Tokenization of Assets, Mt. Gox, Advanced Cryptographic Signatures, Cyber Security, Banking
Price: $4.99 USD. Words: 26,540. Language: English. Published: November 6, 2016. Categories: Nonfiction » Business & Economics » Money & monetary policy, Nonfiction » Computers and Internet » Online services / general
Digital currency and blockchain technology has the potential to disrupt a whole host of industries from financial services to manufacturing, supply chain management, and to health care records, by infusing transparency and trust in traditionally closed systems.
Rapidly Deployable Mobile Security Solutions for the Military: Navy Cyber Policies and Threats, Security, Mobile Devices, Bring Your Own Device (BYOD), Risk Management, Android Application Program
Price: $7.99 USD. Words: 60,940. Language: English. Published: October 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Hardware / handheld devices
The Navy has seen a significant increase in the presence of mobile and smart devices on its units due to advancements in technology and younger sailors' desire to be connected at all times. These devices create security threats due to their easily concealable size and their host of connectivity and image related features.
The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
Price: $5.99 USD. Words: 32,670. Language: English. Published: October 3, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination.
The Origin Point: A Future Tech Cyber Novella
Price: Free! Words: 62,600. Language: English. Published: September 3, 2016. Categories: Fiction » Science fiction » High tech, Fiction » Thriller & suspense » General
Your future is in play and you have not been asked to join the game. In the Origin Point, a future tech cyber novella, a secretive world-class alliance is creating a global surveillance and online tracking system of sweeping control. Can an intrepid journalist and a determined underground cyber technologist stop them before they take total control of your physical and digital life?
The Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job
Price: $7.77 USD. Words: 56,850. Language: English. Published: April 26, 2016. Categories: Nonfiction » Computers and Internet » Enterprise IT management
Learn the plain English information you'll want to cover with your IT professionals to be sure your network and company are protected and that you are getting the most from your IT investment. Never before in history has IT security been so important. Read this book and you'll sleep better at night knowing you are making smart IT decisions that enable your company to grow.
Cyber Security versus Privacy - Mobility in a Global World
Price: $3.99 USD. Words: 9,620. Language: English. Published: April 7, 2016. Categories: Essay » Technology
The author explores new domains of global mobility or new insights gained from re-examining establish cybersecurity topics. Further, the article demonstrates a focus on comprehensive up-to-date literature reviews while including qualitative methodology and touching on theoretical developments. Apple iOS and Android smartphone privacy/security are examined.