Cover Book Actions
Computer Security 2012 - Brian Taylor

Computer Security 2012Brian Taylor

Average wait: N/A

Computer Security Basics and Fundamentals

Computer Security 2012
Brian Taylor
PLANET MULTITASKING An Opini... - khurram afzal

PLANET MULTITASKING An Opini...khurram afzal

This book explains the multitasking, its uses, its advantages, and legal aspects.The author Khurram Afzal actually presents his opinion, which can also beused as an evidence. Moreover, the book tells the computer user to run movieson their … more

PLANET MULTITASKING An Opinion And An Evidence
khurram afzal
khurram afzal , English
Sunshine on Secure Java:  OW... - Natalie "Sunny" Wear

Sunshine on Secure Java: OW...Natalie "Sunny" Wear

Average wait: N/A

This book provides explanations and remediations to the OWASP Top 10 for 2013 web application security vulnerabilities. Java coding techniques are provided within to show how to mitigate attacks. This book shows programmers how to minimiz… more

Sunshine on Secure Java: OWASP Top 10 - Writing Secure Web Applications
Natalie “Sunny” Wear
BookBaby , English
The PC Security Handbook - L... - Inc. Nationwide Consulting Group

The PC Security Handbook - L...Inc. Nationwide Consulting Group

Introducing the new “The PC Security Handbook”Your Info Guide To Beefing Up Your Personal Computer’s Safety From Malicious Threats!Dear Internet Friend,Today, more and more people are using their computers for everything: from communication… more

The PC Security Handbook - Learn How To Secure Your PC Today
Inc. Nationwide Consulting Group
The Ultimate Guide To Spywar... - Arnold Mullins

The Ultimate Guide To Spywar...Arnold Mullins

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good”Say No To The Hackers And Spy’s, And Keep Your PC Safe From All Interruptions Popups and Scam’s Today with a Few Easy Steps”This book covers several topics including:•… more

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good
Arnold Mullins
SSH Mastery: OpenSSH, PuTTY,... - Michael W. Lucas

SSH Mastery: OpenSSH, PuTTY,...Michael W. Lucas

Average wait: N/A

Michael W. Lucas is one of my favorite technical authors, and every book he writes is a must-read for IT professionals.” – Richard Bejtlich, CSO, MANDIANT, and TaoSecurity blogger

Secure Shell (SSH) lets systems administrators securely ma… more

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery Book 1)
Michael W. Lucas
Tilted Windmill Press , English
The BackTrack Experience - I... - Karthik Ranganath

The BackTrack Experience - I...Karthik Ranganath

The BackTrack Experience of a Novice - Introduction to WhiteHat Hacking” is about my experience with back track and I have documented it in the form of a book. I am sure beginners will surely save a lot of their time in understanding conce… more

The BackTrack Experience - Introduction to WhiteHat Hacking
Karthik Ranganath
Social Engineering: Hiding i... - Patricia Arnold

Social Engineering: Hiding i...Patricia Arnold

Average wait: N/A

The movie industry has glamorized the abilities of technically talented people. From Mission Impossible to The Matrix, we are impressed at what the human mind can accomplish with the assistance of a computer. This book doesn’t underestimate… more

Social Engineering: Hiding in Plain Sight (InfoSec Series)
Patricia Arnold
AAA++ Rated - DON'T Use Your... -

AAA++ Rated - DON'T Use Your...

Here’s a list of the topics you’ll find inside:- Spyware Can Destroy - Is Adware/Spyware Legal - How Does Adware/Spyware Spread? - How To Remove Adware/Spyware?- What Programs Help Prevent Adware/Spyware? - Why Stop Spam?- How File Sharing … more

AAA++ Rated - DON’T Use Your Computer Without ME - How to PROTECT Your PC / Computer from VIRUSES & DATA LOSS !! (PLUSBONUSES)
Basic Security Testing with ... - Daniel Dieterle

Basic Security Testing with ...Daniel Dieterle

(Updated 12/2014 - All reported issues have been corrected, Veil Evasion install updated to include new install routine. With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to … more

Basic Security Testing with Kali Linux
Daniel Dieterle
ModSecurity Handbook - Ivan Ristic

ModSecurity HandbookIvan Ristic

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor… more

ModSecurity Handbook
Ivan Ristic
Feisty Duck Ltd , English
Sudo Mastery: User Access Co... - Michael W Lucas

Sudo Mastery: User Access Co...Michael W Lucas

Average wait: N/A

Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilit… more

Sudo Mastery: User Access Control for Real People (IT Mastery Book 3)
Michael W Lucas
Tilted Windmill Press , English
Comptia Security+ Primer - John Greene

Comptia Security+ PrimerJohn Greene

Average wait: N/A

This is the litmus test for anyone studying for CompTIA Security+ Certification. This e-book contains 600 quick-fire Q & A specifically covering the topics on the exam. The questions are similar to those you will face in the exam. ie, multi… more

Comptia Security+ Primer
John Greene
John Greene , English
Linux Journal Paranoid Penguin - Mick Bauer

Linux Journal Paranoid PenguinMick Bauer

Paranoid Penguin is a monthly column featured in Linux Journal.

Linux Journal Paranoid Penguin
Mick Bauer
Belltown Media, Inc , English
IT Security: Internet Usage ... - Kashif Kamran

IT Security: Internet Usage ...Kashif Kamran

Average wait: N/A

Internet usage policy is an essential part of any corporate IT Security plan that is to be defined in any organization. Lack of Internet usage policy may lead to security breaches, infected networks, reduced productivity from employees and … more

IT Security: Internet Usage Policy (IT Security Manual)
Kashif Kamran
The Hacker's Underground Handbook - David Melnichuck

The Hacker's Underground HandbookDavid Melnichuck

The Information Given in this Book will put you into a hacker’s mindset and teach you all of the hacker’s secret ways. The Hacker’s Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It … more

The Hacker’s Underground Handbook
David Melnichuck
Top 10 Reasons Why Computers Crash - Gaurav Dhaka

Top 10 Reasons Why Computers CrashGaurav Dhaka

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”You have just… more

Top 10 Reasons Why Computers Crash
Gaurav Dhaka
A Practical Guide to TPM 2.0... - Will Arthur, David Challener

A Practical Guide to TPM 2.0...Will Arthur, David Challener

Average wait: N/A

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try… more

A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security
Will Arthur, David Challener
Apress , English
Understanding Access Control... - Chris Inskeep

Understanding Access Control...Chris Inskeep

Average wait: N/A

Logon is the unavoidable process that establishes the named user, begins the user session, and enables access control. Logon is simple but its rules are strict. Logon, once begun must be successfully completed or it will be failed, The proc… more

Understanding Access Controls, Logon with Identification & Authentication (Information Security in Brief, July 2012)
Chris Inskeep
Internet Safety for Kids (In... - David Baker

Internet Safety for Kids (In...David Baker

Average wait: N/A

Don’t let your son or daughter fall in the hands of an online sexual predator or cyber bully.The Internet is full of dangers for youngsters and you need to protect your children from these dangers online. This task is for most parents is a … more

Internet Safety for Kids (Internet Safety Tips Book 1)
David Baker
Self Esteem Zone , English