Internet Address and Password Logbook (Personal Internet Address and Password Logbook, #1)
by Windy K Williams
The NSA Report
by Richard A Clarke, Michael J. Morell, Geoffrey R. Stone, Cass R Sunstein, and Peter Swire
"We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."--The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security...
Password Log Book Large Print (Password Log Book Large Print, #1)
by Password Logbook and Internet Ad Portal
The Hacker-Proof Internet Address Password Book - Summer Lake (Personal Internet Address & Password Logbooks, #11)
by Atlantic Journals
Pass Word Manager (Pass Word Manager, #1)
by Password Logbook and Internet Add Press
Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practicesKey FeaturesExplore useful recipes for implementing robust cloud security solutions on AWSMonitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and MaciePrepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offeringsBook DescriptionAs a sec...
Password Journal For Girls (Password Journal for Girls, #1)
by Password Logbook and Internet Ad Portal
Android Hacker's Handbook
by Joshua J Drake, Zach Lanier, Collin Mulliner, Pau Oliva Fora, Stephen A Ridley, and Georg Wicherski
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture...
Ethical Hacking Techniques and Countermeasures for Cybercrime Prevention
As personal data continues to be shared and used in all aspects of society, the protection of this information has become paramount. While cybersecurity should protect individuals from cyber-threats, it also should be eliminating any and all vulnerabilities. The use of hacking to prevent cybercrime and contribute new countermeasures towards protecting computers, servers, networks, web applications, mobile devices, and stored data from black hat attackers who have malicious intent, as well as to...
Password Notebook Alphabetical (Password Notebook Alphabetical, #1)
by Password Logbook and Internet Addre USA
Password Notebook Small (Password Notebook Small, #1)
by Password Logbook and Internet Add Press
This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format. Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. Whether you are new to malware analysis or have some experience, this book will help you get started with Cuckoo Sandbox so you can start analysing...