• Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy

    A FINANCIAL TIMES BOOK OF THE MONTH FROM THE WALL STREET JOURNAL: "Nothing Mr. Gilder says or writes is ever delivered at anything less than the fullest philosophical decibel... Mr. Gilder sounds less like a tech guru than a poet, and his words tumble out in a romantic cascade." “Google’s algorithms assume the world’s future is nothing more than the next moment in a random process. George Gilder shows how deep this assumption goes, what motivates people to make it, and why it’s wrong: the future depends on human action.” — Peter Thiel, founder of PayPal and Palantir Technolog... [Read More]

    • ASIN: 1621575764
    • ASIN: 1621575764
    • ISBN: 1621575764
    • Brand: Gateway Editions
    • Manufacturer: Gateway Editions

  • Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

    Completely Rewritten Sixth Edition Sheds New Light on Open Source Intelligence Collection and Analysis Author Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for ... [Read More]

    • ASIN: 1984201573
    • ASIN: 1984201573
    • ISBN: 1984201573
    • Manufacturer: CreateSpace Independent Publishing Platform

  • The President Is Missing: A Novel


    • ASIN: B072F3MYRH
    • ASIN: B072F3MYRH
    • Manufacturer: Little, Brown and Company

  • Hacking: The Art of Exploitation, 2nd Edition

    Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacke... [Read More]

    • ASIN: 1593271441
    • UPC: 884870524442
    • ASIN: 1593271441
    • ISBN: 1593271441
    • Brand: imusti
    • Manufacturer: No Starch Press

  • Hadoop: The Definitive Guide: Storage and Analysis at Internet Scale

    Get ready to unlock the power of your data. With the fourth edition of this comprehensive guide, you’ll learn how to build and maintain reliable, scalable, distributed systems with Apache Hadoop. This book is ideal for programmers looking to analyze datasets of any size, and for administrators who want to set up and run Hadoop clusters.Using Hadoop 2 exclusively, author Tom White presents new chapters on YARN and several Hadoop-related projects such as Parquet, Flume, Crunch, and Spark. You’ll learn about recent changes to Hadoop, and explore new case studies on Hadoop’s role in healthca... [Read More]

    • ASIN: 1491901632
    • ASIN: 1491901632
    • ISBN: 1491901632
    • Brand: O'Reilly Media
    • Manufacturer: O'Reilly Media

  • Common Stocks and Uncommon Profits and Other Writings

    Widely respected and admired, Philip Fisher is among the most influential investors of all time. His investment philosophies, introduced almost forty years ago, are not only studied and applied by today's financiers and investors, but are also regarded by many as gospel. This book is invaluable reading and has been since it was first published in 1958. The updated paperback retains the investment wisdom of the original edition and includes the perspectives of the author's son Ken Fisher, an investment guru in his own right in an expanded preface and introduction "I sought out Phil Fisher after... [Read More]

    • ASIN: 0471445509
    • ASIN: 0471445509
    • ISBN: 9780471445500
    • Brand: John Wiley Sons
    • Manufacturer: Wiley

  • Kaspersky Internet Security 2017 | 1 Device | 1 Year | Download [Online Code]

    Premium Internet Security ProtectionSystem Requirements:Supported OS:  Windows 10 Windows 8.1 Windows 8 Windows 7 Windows Vista Windows XP  Mac OS X 10.8 Mountain Lion  Mac OS X 10.7 Lion  Mac OS X 10.6 Snow Leopard  Mac OS X 10.5 Leopard

    • ASIN: B01K5XELFQ
    • ASIN: B01K5XELFQ
    • Brand: Kaspersky
    • Manufacturer: Kaspersky

  • The Little Book That Still Beats the Market


    • ASIN: 0470624159
    • ASIN: 0470624159
    • ISBN: 0471733067
    • Brand: John Wiley Sons
    • Manufacturer: John Wiley & Sons

  • Ring Alarm 5 Piece Kit - Home Security System with optional 24/7 Professional Monitoring - No long-term contracts - Works with Alexa

    When armed, the Ring Alarm Security System sends instant alerts to your phone and tablet whenever doors or windows open and when motion is detected at home. It’s fully customizable and expands to fit any house or apartment. And the free Ring App puts your entire home security system at your fingertips. With optional 24/7 professional monitoring for only $10 a month, whole-home security has never been this affordable.Tech Specs - Base StationPower: 100 – 240V 50/60Hz AC Adapter IncludedBattery Life: Rechargeable 24 Hour Battery BackupOperating Conditions: 32°F to 104°F (0°C to 40°C)Sire... [Read More]

    • ASIN: B07D7Q6CHB
    • UPC: 842861101959
    • ASIN: B07D7Q6CHB
    • Brand: Ring
    • Size: Bundle
    • Manufacturer: Ring

  • The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage

    Before the Internet became widely known as a global tool for terrorists, one perceptive U.S. citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the... [Read More]

    • ASIN: 1416507787
    • UPC: 787721923671
    • ASIN: 1416507787
    • ISBN: 1416507787
    • Brand: Gallery Books
    • Manufacturer: Pocket Books

  • IPVanish VPN


    • ASIN: B071GDC48J
    • ASIN: B071GDC48J
    • Brand: IPVanish VPN
    • Manufacturer: IPVanish VPN

  • The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

    In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of... [Read More]

    • ASIN: 0451497899
    • ASIN: 0451497899
    • ISBN: 9780451497895
    • Manufacturer: Crown

  • Software Security: Building Security In

     "When it comes to software security, the devil is in the details. This book tackles the details." --Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies   "McGraw's book shows you how to make the 'culture of security' part of your development lifecycle." --Howard A. Schmidt, Former White House Cyber Security Advisor   "McGraw is leading the charge in software security. His advice is as straightforward as it is actionable. If your business relies on software (and whose doesn't), buy this book and post it up on the lunchroom wall." --Avi Rubin, Dir... [Read More]

    • ASIN: 0321356705
    • UPC: 785342356700
    • ASIN: 0321356705
    • ISBN: 9780321356703
    • Brand: McGraw, Gary
    • Manufacturer: Addison-Wesley Professional

  • Ring Chime Pro, Indoor Chime and Wi-Fi Extender ONLY for Ring Network Devices

    Chime Pro extends the signal from your router to your Ring devices, so you can eliminate Wi-Fi dead zones and ensure that your Ring devices stay connected to the internet. It’s also an indoor chime that amplifies Ring notifications, so you’ll never miss an alert. Chime Pro can be set up in just a few minutes. Simply plug Chime Pro into any standard power outlet, link it to all your Ring devices, and you’re good to go. With Chime Pro, you’ll never have to worry about your Ring devices going offline, and you’ll always know when you have a visitor. Chime Pro strengthens the Ring of Se... [Read More]

    • ASIN: B01N9EX0YR
    • UPC: 852239005307
    • ASIN: B01N9EX0YR
    • Brand: Ring
    • Manufacturer: Ring

  • Sotion Video Baby Monitor, HD Wireless Pet Camera with Two Way Audio and Night Vision for Home/Indoor Security, Internet IP Surveillance WiFi Camera System with Motion Detection, Pan and Tilt

    About Camera App After extensively research on IP camera market, Our team realized that the setup process and Wi-Fi connection stability may be pains for most of users. To address these issues, Our App SotionCam simplifies the setup process in one page. The setup wizard is clearly instructed. You just plug in the cable, scan the QR code to acquire camera ID, select a network and input the network password. The camera will not lose Wi-Fi connection after you set it up. The user manual is built-in to the App. No registration is required. Just download and install it, and you are ready to use. Yo... [Read More]

    • ASIN: B07DBD51KT
    • UPC: 094393449171
    • ASIN: B07DBD51KT
    • Brand: Sotion
    • Size: 960P
    • Manufacturer: Sotion

  • Zebora 960P Remote Controlled Internet WiFi Wireless Network/IP Camera for Surveillance, Home Security, Pet, Nanny and Baby Monitor with Motion Detection,Two-way Audio and Night Vision

    About ZeboraCam App: Zebora team realized that the setup process and Wi-Fi connection stability may be painful to most of users. To address these issues, ZeboraCam simplifies the setup process. The setup wizard is clearly

    • UPC: 158798722
    • Color: White
    • Rating: 5.0

  • Wireless Super HD 1080P Internet WiFi Wireless Network IP Security Surveillance Video Camera System, Pet and Nanny Monitor with Pan and Tilt, Two Way Audio & Night Vision

    Specification:Colour: BlackMaterial: AbsProcessor: Ak3918E+Sc1145App:V380Platform: 360Eye.CcOperating System: Embedded Linux Operating SystemImage Sensor: 1/4′′ High Definition Cmos 1 Megapixel Cmos SensorVideo Format: Hd (1920×1080P)Video Coding: H.264Video Frame Rate: 1-30 FramesVideo Mode: Manual Recording, Alarm RecordingVideo Playback Mode:

    • UPC: 207930269
    • Model: RI190425

  • Indoor/Outdoor WiFi Security PTZ Camera HD 1080P IP Camera Vandal Dome Optical Zoom Motion Sensor IP66 Weatherproof Wireless Surveillance Internet Two-way Talk Moving Detect

    1080P Security Camera Outdoor Onvif, Super HD Vandalproof Camera, Infrared Night Vision, Pan/Tilt/Zoom Viewing Angle, IP66 Waterproof, Remote Access, Motion AlertFeatures:-【Fast Easy WiFi Setting】This indoor home security camera is wireless. Power on the camera, set

    • UPC: 275566296
    • Color: AUGIENB AOther

  • SereneLife Outdoor IP Camera - HD 720p Weatherproof Wireless Home WiFi Security Surveillance Internet Video w/ 16g SD Storage Motion Detection Night Vision for PC iOS Android - IPCAMHD15

    AUTOMATIC NIGHT VISION IR: Check the bullet cam video surveillance camera live feed in the dark up to 50’! Protective aluminum housing is heavy duty and include sun hood shade to reduce glare.HD HIGH DEFINITION

    • UPC: 497046374

  • Firewalls and Internet Security : Repelling the Wily Hacker

    Written by the people responsible for designing and maintaining AT&TUs Internet gateway, this is the definitive description and practical guide to protecting networks from hacker attacks. The book shows how to set up a "firewall"

    • UPC: 24658046
    • Rating: 4.0

  • Trend Micro TRE021800G301 Internet Security 2017 (3-Devices) Mac|Ios TRE021800G301

    Trend Micro Security provides advanced protection and privacy so you can enjoy your digital life safely. It helps protect you from identity theft, in addition to safeguarding against viruses, ransomware, spam, and other malwareTrend Micro

    • UPC: 899976035

  • Webroot Internet Security Complete + Antivirus | 5 Devices | 1 Year | PC Download

    Powerful, lightweight protection for PC, Mac® and Android™ devices, cloud-based Webroot® Internet Security Complete with antivirus protects personal information by blocking the latest malware, phishing, and cyberattacks. We continuously analyze and classify billions of apps,

    • UPC: 56221703
    • Model: 29114
    • Rating: 4.682

  • Healthy Windows Security Essentials for Beginners. Understanding Malware, Spyware, AntiVirus and Internet Security.: Oh No! My Computer's Acting Weird

    Call me a geek because that's what I am (so my friends tell me). I love computers, I love technical stuff. I am a technical guy. I have a company in which my secretary answers

    • UPC: 53621406

  • Cyber Analogies: Historical Parallels to Cyber Warfare, Cyber and Computer Security, Cyber Pearl Harbor Surprise Attack, Nuclear Scenarios, Internet and Web Attacks, Vulnerabilities - eBook

    This anthology of cyber analogies will resonate with readers whose duties call for them to set strategies to protect the virtual domain and determine the policies that govern it. Our belief it that learning is

    • UPC: 722399153

  • Internet Security Made Easy : Take Control of Your Online World

    "Take control of your online

    • UPC: 46680602

  • The Business of Cyber Security

    How Israel Rules The World Of Cyber Security | VICE on HBO

    How it Works: Cybersecurity