Cover Book Actions

AAA++ Rated - DON'T Use Your...

Here’s a list of the topics you’ll find inside:- Spyware Can Destroy - Is Adware/Spyware Legal - How Does Adware/Spyware Spread? - How To Remove Adware/Spyware?- What Programs Help Prevent Adware/Spyware? - Why Stop Spam?- How File Sharing … more

AAA++ Rated - DON’T Use Your Computer Without ME - How to PROTECT Your PC / Computer from VIRUSES & DATA LOSS !! (PLUSBONUSES)

The Beginner's Guide to the ...Jeremy Martin

Average wait: N/A

This doc covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Disclaimer: Do NOT break the law. This was written to explain what the Darknet / Tor hidden se… more

The Beginner’s Guide to the Internet Underground
Jeremy Martin
Information Warfare Center , English

The PC Security Handbook - L...Inc. Nationwide Consulting Group

Introducing the new “The PC Security Handbook”Your Info Guide To Beefing Up Your Personal Computer’s Safety From Malicious Threats!Dear Internet Friend,Today, more and more people are using their computers for everything: from communication… more

The PC Security Handbook - Learn How To Secure Your PC Today
Inc. Nationwide Consulting Group

Linux Journal Paranoid PenguinMick Bauer

Paranoid Penguin is a monthly column featured in Linux Journal.

Linux Journal Paranoid Penguin
Mick Bauer
Belltown Media, Inc , English

Social Engineering: Hiding i...Patricia Arnold

The movie industry has glamorized the abilities of technically talented people. From Mission Impossible to The Matrix, we are impressed at what the human mind can accomplish with the assistance of a computer. This book doesn’t underestimate… more

Social Engineering: Hiding in Plain Sight (InfoSec Series)
Patricia Arnold

Computer Security 2012Brian Taylor

Average wait: N/A

Computer Security Basics and Fundamentals

Computer Security 2012
Brian Taylor

The BackTrack Experience - I...Karthik Ranganath

The BackTrack Experience of a Novice - Introduction to WhiteHat Hacking” is about my experience with back track and I have documented it in the form of a book. I am sure beginners will surely save a lot of their time in understanding conce… more

The BackTrack Experience - Introduction to WhiteHat Hacking
Karthik Ranganath

Top 10 Reasons Why Computers CrashGaurav Dhaka

Fatal error: the system has become unstable or is busy,” it says. “Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications.”You have just… more

Top 10 Reasons Why Computers Crash
Gaurav Dhaka

ModSecurity HandbookIvan Ristic

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor… more

ModSecurity Handbook
Ivan Ristic
Feisty Duck Ltd , English

Basic Security Testing with ...Daniel Dieterle

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.

Kali Linux is an Ethical Hacking platform that allows good… more

Basic Security Testing with Kali Linux
Daniel Dieterle

PLANET MULTITASKING An Opini...khurram afzal

This book explains the multitasking, its uses, its advantages, and legal aspects.The author Khurram Afzal actually presents his opinion, which can also beused as an evidence. Moreover, the book tells the computer user to run movieson their … more

PLANET MULTITASKING An Opinion And An Evidence
khurram afzal
khurram afzal , English

The Hacker's Underground HandbookDavid Melnichuck

The Information Given in this Book will put you into a hacker’s mindset and teach you all of the hacker’s secret ways. The Hacker’s Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It … more

The Hacker’s Underground Handbook
David Melnichuck

The Essential Guide to Inter...Michael Nickle

Average wait: N/A

Computer security is a complex topic, especially for those who aren’t IT professionals. This book offers a clear and easy-to-understand approach to Windows security risks and attacks for PC users. By boiling down the topic to just the esse… more

The Essential Guide to Internet Security for Windows 7 & Windows XP
Michael Nickle

Sunshine on Secure Java: OW...Natalie "Sunny" Wear

Average wait: N/A

This book provides explanations and remediations to the OWASP Top 10 for 2013 web application security vulnerabilities. Java coding techniques are provided within to show how to mitigate attacks. This book shows programmers how to minimiz… more

Sunshine on Secure Java: OWASP Top 10 - Writing Secure Web Applications
Natalie “Sunny” Wear
BookBaby , English

IT Security: Internet Usage ...Kashif Kamran

Average wait: N/A

Internet usage policy is an essential part of any corporate IT Security plan that is to be defined in any organization. Lack of Internet usage policy may lead to security breaches, infected networks, reduced productivity from employees and … more

IT Security: Internet Usage Policy (IT Security Manual)
Kashif Kamran

SSH Mastery: OpenSSH, PuTTY,...Michael W. Lucas

Average wait: N/A

Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.This book saves you from sifting a decade of o… more

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Michael W. Lucas
Tilted Windmill Press , English

Sudo Mastery: User Access Co...Michael W Lucas

Average wait: N/A

Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilit… more

Sudo Mastery: User Access Control for Real People
Michael W Lucas
Tilted Windmill Press , English

The Ultimate Guide To Spywar...Arnold Mullins

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good”Say No To The Hackers And Spy’s, And Keep Your PC Safe From All Interruptions Popups and Scam’s Today with a Few Easy Steps”This book covers several topics including:•… more

The Ultimate Guide To Spyware Removal: How To Eliminate Spyware For Good
Arnold Mullins

The Holistic Operational Rea...Michael Peters

Governance Documentation and Information Technology Security Policies Demystified is the professional companion book to the popular global resource, the HORSE Project Wiki, that provides a comprehensive examination of corporate information … more

The Holistic Operational Readiness Security Evaluation: HORSE Project Series: Governance Documentation and Information Technology Security Policies Demystified
Michael Peters

2600 Magazine: The Hacker Qu...2600 Magazine

Average wait: N/A

Note: Currently, Kindle Magazines doesn’t support certain formats (Mac and PC) with subscriptions. However, these formats are supported when purchasing individual issues. Until this situation is resolved, 2600 is providing each individual i… more

2600 Magazine: The Hacker Quarterly - Autumn 2012
2600 Magazine
2600 Enterprises , English