Books tagged: internet security

These results show books which have been specifically tagged with this keyword. You can also try doing a general search for the term "internet security" .
You can also limit results to books that contain two tags.
Try one of these commonly-used combinations:
Some content may be filtered out. To view such content, change your filtering option.

Found 30 results

Online Hacker Survival Guide
Price: $3.99 USD. Words: 5,610. Language: English. Published: October 23, 2018. Categories: Nonfiction » Computers and Internet » Data storage, Nonfiction » Computers and Internet » Online services / general
The 21st century is not only an era of technical and computer innovations but the time when each of us can face a hackers’ attack. You may have noticed that your computer started acting unusual, for example, suddenly opened a CD drive or launched programs without any command. Such a weirdness can be explained by system mistakes, but it’s also likely to be outer intervention to your computer system
How to Become Anonymous, Secure and Free Online
Price: Free! Words: 36,960. Language: American English. Published: August 7, 2018. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Current affairs
This book describes how internet users can become anonymous, secure and free. It gives many free resources and methods for users who want to go anonymous and protect their personal data from being accessed or hacked from outside sources. Ethical concerns for anonymous use are also discussed, along with legal issues that affect freedom and privacy for common citizens who use the internet.
2018 Department of Homeland Security Cybersecurity Strategy - Five Pillar Framework of Risk Identification, Vulnerability Reduction, Threat Reduction, Consequence Mitigation, and Cyberspace Outcomes
Price: $6.99 USD. Words: 25,750. Language: English. Published: May 30, 2018. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
This strategy provides the Department with a framework to execute our cybersecurity responsibilities during the next five years to keep pace with the evolving cyber risk landscape by reducing vulnerabilities and building resilience; countering malicious actors in cyberspace; responding to incidents; and making the cyber ecosystem more secure and resilient.
Screen Resolution
Price: $9.95 USD. Words: 48,680. Language: English. Published: October 24, 2017 by Aurora House. Categories: Nonfiction » Relationships and Family » Child abuse, Nonfiction » True Crime » Computer Crime
In Screen Resolution, Brett describes his experiences in real and powerful terms, profiling predator behaviours and exposing their sinister intentions.
For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
Price: $6.99 USD. Words: 37,560. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Networking / security
This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force.
Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM)
Price: $5.99 USD. Words: 32,290. Language: English. Published: December 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » European
Defining and understanding what constitutes a cyber-attack is a complicated matter, largely due to the fact that there has not yet been a large-scale cyber-attack upon any nation.
Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea
Price: $7.99 USD. Words: 41,180. Language: English. Published: November 29, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur.
Adware and Spyware
Price: $2.99 USD. Words: 9,650. Language: English. Published: November 12, 2016. Categories: Nonfiction » Computers and Internet » Security / viruses
Spyware and adware are two different animals.  Each has the ability to make your life a mess.  If you rely on the internet for anything or you rely on your computer for anything, it is a must that you fully understand what these things are and how they work. The first key to protecting yourself from these things is to fully understand what they are.
The Millennial Generation as an Insider Cyber Security Threat: High Risk or Overhyped? Comparisons to GenX and Baby Boomers, Computer Security, Information Theft, US-CERT Risk Factors, Edward Snowden
Price: $5.99 USD. Words: 32,670. Language: English. Published: October 3, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Millennials are commonly thought of as entitled, high maintenance, and less trustworthy than the older generations; in other words, they have personality traits associated with insider threats, making the insider threat and the Millennial a dangerous combination.
Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources
Price: $8.99 USD. Words: 161,510. Language: English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet / security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces five important military reports and studies dealing with cyberspace attacks and computer network security.