Lendle

Cover Book Actions
The Ultimate Guide To Spywar... - Arnold Mullins
 

The Ultimate Guide To Spywar...Arnold Mullins

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good”Say No To The Hackers And Spy’s, And Keep Your PC Safe From All Interruptions Popups and Scam’s Today with a Few Easy Steps”This book covers several topics including:•… more

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good
Arnold Mullins
English
The BackTrack Experience - I... - Karthik Ranganath
 

The BackTrack Experience - I...Karthik Ranganath

The BackTrack Experience of a Novice - Introduction to WhiteHat Hacking” is about my experience with back track and I have documented it in the form of a book. I am sure beginners will surely save a lot of their time in understanding conce… more

The BackTrack Experience - Introduction to WhiteHat Hacking
Karthik Ranganath
English
AAA++ Rated - DON'T Use Your... -
 

AAA++ Rated - DON'T Use Your...

Here’s a list of the topics you’ll find inside:- Spyware Can Destroy - Is Adware/Spyware Legal - How Does Adware/Spyware Spread? - How To Remove Adware/Spyware?- What Programs Help Prevent Adware/Spyware? - Why Stop Spam?- How File Sharing … more

AAA++ Rated - DON’T Use Your Computer Without ME - How to PROTECT Your PC / Computer from VIRUSES & DATA LOSS !! (PLUSBONUSES)
English
The Hacker's Underground Handbook - David Melnichuck
 

The Hacker's Underground HandbookDavid Melnichuck

The Information Given in this Book will put you into a hacker’s mindset and teach you all of the hacker’s secret ways. The Hacker’s Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It … more

The Hacker’s Underground Handbook
David Melnichuck
English
Social Engineering: Hiding i... - Patricia Arnold
 

Social Engineering: Hiding i...Patricia Arnold

Average wait: N/A

The movie industry has glamorized the abilities of technically talented people. From Mission Impossible to The Matrix, we are impressed at what the human mind can accomplish with the assistance of a computer. This book doesn’t underestimate… more

Social Engineering: Hiding in Plain Sight (InfoSec Series)
Patricia Arnold
English
IT Security: Internet Usage ... - Kashif Kamran
 

IT Security: Internet Usage ...Kashif Kamran

Average wait: N/A

Internet usage policy is an essential part of any corporate IT Security plan that is to be defined in any organization. Lack of Internet usage policy may lead to security breaches, infected networks, reduced productivity from employees and … more

IT Security: Internet Usage Policy (IT Security Manual)
Kashif Kamran
English
ModSecurity Handbook - Ivan Ristic
 

ModSecurity HandbookIvan Ristic

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor… more

ModSecurity Handbook
Ivan Ristic
Feisty Duck Ltd , English
Basic Security Testing with ... - Daniel Dieterle
 

Basic Security Testing with ...Daniel Dieterle

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good… more

Basic Security Testing with Kali Linux
Daniel Dieterle
English
Sunshine on Secure Java:  OW... - Natalie "Sunny" Wear
 

Sunshine on Secure Java: OW...Natalie "Sunny" Wear

Average wait: N/A

This book provides explanations and remediations to the OWASP Top 10 for 2013 web application security vulnerabilities. Java coding techniques are provided within to show how to mitigate attacks. This book shows programmers how to minimiz… more

Sunshine on Secure Java: OWASP Top 10 - Writing Secure Web Applications
Natalie “Sunny” Wear
BookBaby , English
The PC Security Handbook - L... - Inc. Nationwide Consulting Group
 

The PC Security Handbook - L...Inc. Nationwide Consulting Group

Introducing the new “The PC Security Handbook”Your Info Guide To Beefing Up Your Personal Computer’s Safety From Malicious Threats!Dear Internet Friend,Today, more and more people are using their computers for everything: from communication… more

The PC Security Handbook - Learn How To Secure Your PC Today
Inc. Nationwide Consulting Group
English
The Beginner's Guide to the ... - Jeremy Martin
 

The Beginner's Guide to the ...Jeremy Martin

This doc covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Disclaimer: Do NOT break the law. This was written to explain what the Darknet / Tor hidden se… more

The Beginner’s Guide to the Internet Underground
Jeremy Martin
Information Warfare Center , English
PLANET MULTITASKING An Opini... - khurram afzal
 

PLANET MULTITASKING An Opini...khurram afzal

This book explains the multitasking, its uses, its advantages, and legal aspects.The author Khurram Afzal actually presents his opinion, which can also beused as an evidence. Moreover, the book tells the computer user to run movieson their … more

PLANET MULTITASKING An Opinion And An Evidence
khurram afzal
khurram afzal , English
Computer Security 2012 - Brian Taylor
 

Computer Security 2012Brian Taylor

Average wait: N/A

Computer Security Basics and Fundamentals

Computer Security 2012
Brian Taylor
English
SSH Mastery: OpenSSH, PuTTY,... - Michael W. Lucas
 

SSH Mastery: OpenSSH, PuTTY,...Michael W. Lucas

Average wait: N/A

Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.This book saves you from sifting a decade of o… more

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Michael W. Lucas
Tilted Windmill Press , English
Sudo Mastery: User Access Co... - Michael W Lucas
 

Sudo Mastery: User Access Co...Michael W Lucas

Average wait: N/A

Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilit… more

Sudo Mastery: User Access Control for Real People
Michael W Lucas
Tilted Windmill Press , English
Linux Journal Paranoid Penguin - Mick Bauer
 

Linux Journal Paranoid PenguinMick Bauer

Paranoid Penguin is a monthly column featured in Linux Journal.

Linux Journal Paranoid Penguin
Mick Bauer
Belltown Media, Inc , English
Top 10 Reasons Why Computers Crash - Gaurav Dhaka
 

Top 10 Reasons Why Computers CrashGaurav Dhaka

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”You have just… more

Top 10 Reasons Why Computers Crash
Gaurav Dhaka
English
U.S. Army War College Inform... - U.S. Government, Department ...
 

U.S. Army War College Inform...U.S. Government, Department ...

Average wait: N/A

This latest revision of the Information Operations Primer provides an overview of Department of Defense (DoD) Information Operations (IO) doctrine and organizations at the joint and individual service levels. It is primarily intended to ser… more

U.S. Army War College Information Operations Primer - Fundamentals of Information Operations - Botnet, Stuxnet, Cyber Warfare, NSA, Service Organizations
U.S. Government, Department of Defense, U.S. Army, U.S. Army War College
Progressive Management , English
Wordpress Security Tips - Robert Vance
 

Wordpress Security TipsRobert Vance

Average wait: N/A

With its many advantages, WordPress is not without potential security flaws. As open source software, small businesses and nonprofits may be more vulnerable of being hacked than they realize. We are honored to have a WordPress Security expe… more

Wordpress Security Tips
Robert Vance
Eagle Ap, Inc. , English
September 2012, Appropriate ... - Chris Inskeep
 

September 2012, Appropriate ...Chris Inskeep

Average wait: N/A

This edition of the Security in Brief series introduces the concepts of computers that can appropriately protect their data (compliant computers) and those that cannot (noncompliant computers) and the concept of data with value (Type A) and… more

September 2012, Appropriate Use, Compliant and Noncompliant Computers (Security in Brief)
Chris Inskeep
English