Computing & Internet Networking & Security Books

Introduction to cyber security: stay safe online

This 24-hour free course introduced online security: how to recognise threats and take steps to reduce the chances that they will occur.

Network security

This 25-hour free course discussed network security and the intricacies of maintaining system resilience. It assumed an advanced knowledge of computing.

AWS Identity and Access Management (IAM) User Guide

This is official Amazon Web Services (AWS) documentation for AWS Identity and Access Management (IAM). This user guide provides a conceptual overview of IAM, a web service that enables AWS customers to manage users and user permissions within AWS. The guide also describes business use cases, explains AWS permissions and policies, describes how to integrate IAM with other AWS products and services, and provides instructions on using the various features with the AWS Management Console (an easy-to-use graphical interface), the command line interface (CLI), or the IAM API. This documentation is offered for free here as a Kindle book, or you can read it online or in PDF format at

Against Authority: Freedom and the Rise of the Surveillance States

In both his novels and in his 2005 essay, How We Live Now, John Twelve Hawks was one of the first authors to warn us about the growing power of surveillance technology. Now he has written a personal and controversial book that shows how our lives are watched and analyzed by governments and international corporations. In a world in which our actions can be monitored by a computerized grid of social control, is there anything we can do to defend our freedom?

Amazon Web Services: Overview of Security Processes (AWS Whitepaper)

June 2016

This document is intended to answer questions such as "How does AWS help me ensure my data are secure?" Specifically, AWS physical and operational security processes are described for network and infrastructure under AWS' management, as well as service-specific security implementations.

AWS CloudHSM User Guide

This is official Amazon Web Services (AWS) documentation for AWS CloudHSM. AWS CloudHSM provides secure cryptographic key storage to customers by making hardware security modules (HSMs) available in the AWS cloud. This documentation is offered for free here as a Kindle book, or you can read it online or in PDF format at

E-mail Hacking for IT Security Professionals (HackerStorm Penetration Testing Guides Book 2)

E-Mail Hacking for IT Security Professionals enables both penetration testers and security professionals to plan and execute better testing of e-mail solutions.

Unlike most 'hacking' books, this guide covers all aspects of testing e-mail covering the scope of testing, expectations, policy and process reviews, design, strategy, implementation, operational support, third party managed services and more.

Using the information provided, you can create a more meaningful scope for your test plan which is both relevant and ensures the results of the testing are much more trustworthy reducing the risk of having a false sense of security from poor testing or test plans.

Anyone considering testing e-mail, wether they are a penetration tester, hacker or security manager will benefit as the book provides a minimum list of items to consider for testing, you can be confident that your testing is not only good quality, it can also help evaluate the quality of the testers being hired or ensure any in house testing is conducted to a reasonable standard too.

Finally, the book is 'vendor neutral' with a summarised checklist for easy test plan creation which can be modified accordingly for any scenario or solution.

Ebook: Cloud Services (Innovation Trends Series)

Ebook: Cloud Services, an Innovation Trends Series paper by BBVA Innovation Center.

Day One: Junos for IOS Engineers (Junos Fundamentals Book 8)

Day One: Junos for IOS Engineers

When it's time to swap out your Cisco routers with new Juniper Networks devices, use this book to expand your skill set to include Junos, and make the transition to an advanced operating system with speed and confidence.

There comes a time in every network engineer's career when they need to transition to other technologies, but appearances of complexity can get in the way. To make the path from IOS to Junos easier, you need a book that can make you feel confident about how your new Juniper Network router, switch, or security device operates.

Day One: Junos for IOS Engineers addresses these needs of the IOS-trained engineer by providing a side-by-side comparison of configurations and techniques in both IOS and Junos. In a few quick steps you can compare what you did yesterday with IOS to what you can do today with Junos. Along the way are insights, tips, and no-nonsense explanations of what is taking place. If you are an engineer who is already familiar with IOS, get ready to see the 'Junos way' in action, whether it's simply using a different syntax or a whole new efficient way of networking.

"This Day One book is just what was needed for those of us who know IOS but need to know Junos. The examples being shown side-by-side between IOS and Junos really helps us understand the Junos configuration." - Jeff Fry, CCIE #22061


Understand the differences in thought process between Junos and IOS.

Configure simple functions and common tasks on any Junos device.

Compare Junos configurations to your accustomed IOS configurations.

Write configurations for small networks utilizing VLANs, OSPF and BGP.

About the Author

Chris Jones is a Network Engineer, certified with Juniper as JNCIE-ENT #272, and with Cisco Systems as CCIE #25655 (R&S). Chris has more than eight years of industry experience with both Cisco and Juniper products and solutions.

Architecting for HIPAA Security and Compliance on Amazon Web Services (AWS Whitepaper)

August 2016

This paper briefly outlines how companies can use Amazon Web Services to power HIPAA-compliant information processing systems.

A Deep Dive into Strategic Network Design Programming: OPL CPLEX Edition

This book is a complement to Supply Chain Network Design ( by the same authors and will help you get started writing optimization code in OPL, IBM's math programming language for CPLEX. It opens with the very basics--you don't have to know anything about writing math programs to begin.

Unlike other basic books on math programming, this book focuses just on the facility location problem. This allows the authors to introduce more advanced modeling techniques and build upon the simple models in the early chapters. In addition, the book also introduces ideas from software engineering to help you build more robust and commercial grade code.

This book is perfect for an introduction class to optimization or for someone who wants to teach themselves how to build mathematical models. Assumes the reader has a working version of the IBM ILOG CPLEX Studio product.

Amazon Virtual Private Cloud (VPC) Network Administrator Guide

This is official Amazon Web Services (AWS) documentation for Amazon Virtual Private Cloud (VPC). Amazon Virtual Private Cloud enables you to create a virtual network topology--including subnets and routing--for your Amazon Elastic Compute Cloud (EC2) resources. This guide is only for Amazon VPC customers who plan to use an IPsec hardware VPN with their VPC. This documentation is offered for free here as a Kindle book, or you can read it online or in PDF format at


If you are deciding upon buying Dell Byte Corseca Bluetooth Headset, this lightning quick guide provides you helpful advice and tips that answers your hidden fears and questions. This lightning quick guide provides accurate solutions in question-answer format. You will find correct answers to nagging issues posted by reviewers. This lightning quick guide also provides exciting advice for music fans by comparing the headset with wireless neckband mp3 players.