Skip to main content
Toggle navigation
Login
Contact Us
For Authors
Home
Category
Arts & Photography
Biographies & Memoirs
Business & Money
Children's eBooks
Comics, Manga & Graphic Novels
Computers & Technology
Cookbooks, Food & Wine
Crafts, Hobbies & Home
Education & Teaching
Engineering & Transportation
Foreign Languages
Health, Fitness & Dieting
History
Humor & Entertainment
Law
LGBTQ+ eBooks
Literature & Fiction
Medical eBooks
Mystery, Thriller & Suspense
Nonfiction
Parenting & Relationships
Politics & Social Sciences
Reference
Religion & Spirituality
Romance
Science & Math
Science Fiction & Fantasy
Self-Help
Sports & Outdoors
Teen & Young Adult
Travel
Search
Home
Online Safety & Piracy
Online Safety & Piracy
How to Hack a Human: A Brief Introduction
Raef Meeuwisse
A Simpler Guide to Online Security for Everyone: How to protect yourself and stay safe from fraud, scams and hackers with easy cyber security tips for ... and other Google services (Simpler Guides)
Ceri Clark
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao
Modern Socio-Technical Perspectives on Privacy
Bart P. Knijnenburg, Xinru Page, Pamela Wisniewski, Heather Richter Lipford, Nicholas Proferes, Jennifer Romano
Challenges in Cybersecurity and Privacy - the European Research Landscape
Jorge Bernal Bernabe, Antonio Skarmeta
Obstructions in Security-Aware Business Processes: Analysis, Detection, and Handling
Julius Holderer
Cyber Risk and Financial Stability (Staff Discussion Notes)
Ms. Jennifer A. Elliott, Christopher Wilson, Mr. Tanai Khiaonarong, Nigel Jenkinson, Frank Adelmann, Anastasiia Morozova, Tamas Gaidosch, Nadine Schwarz, Ibrahim Ergen
Powering the Digital Economy: Opportunities and Risks of Artificial Intelligence in Finance (Departmental Papers)
Mr. Alin T Mirestean, Aquiles Farias, Jose Deodoro, El Bachir Boukherouaa, Khaled AlAjmi, Ebru S Iskender, Rangachary Ravikumar, Mr. Ghiath Shabsigh
Perspectives on Digital Humanism
Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi
Cyber Security Politics: Socio-Technological Transformations and Political Fragmentation (CSS Studies in Security and International Relations)
Myriam Dunn Cavelty, Andreas Wenger
The Huawei and Snowden Questions: Can Electronic Equipment from Untrusted Vendors be Verified? Can an Untrusted Vendor Build Trust into Electronic Equipment? ... (Simula SpringerBriefs on Computing Book 4)
Olav Lysne
Simula SpringerBriefs on Computing (7 Book Series)
Security in Distributed, Grid, Mobile, and Pervasive Computing
Yang Xiao
The Ethics of Cybersecurity (The International Library of Ethics, Law and Technology Book 21)
Markus Christen, Bert Gordijn, Michele Loi
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Raghuram Yeluri, Enrique Castro-Leon
Online Safety: Scams, SPAM, Viruses and Clouds (Cyber Security Community Book 1)
A. M. Perry
Staff Discussion Notes (3 Book Series)
Featured Books
Romance: Carpe DiEmily (Part 1)
Riley J. Ford
Romance: Simone: Adventures in Dating (Book 1: The Billionaire) (Simone Series)
Riley J. Ford
The Fifth Vital: A Prelude
Mike Majlak, Riley J. Ford
Free Books For Free
is an author-approved catalog of all the free Ebooks on Amazon. Start reading on your Kindle or tablet now!
Popular Books
CLIENT MAGNETS: HOW TO ATTRACT AND WIN MORE CLIENTS: Simple Strategies to Grow your Creative, Design or Freelance Business
Stephen Mayall
The Academic Book of the Future
Re: Coming Out to Play: Readers Respond to Robbie's Story
The Ultimate Guide to Remote Work: How to Grow, Manage and Work with Remote Teams (Zapier App Guides Book 3)
Wade Foster, Danny Schreiber, Alison Groves, Matthew Guay, Jeremy DuVall, Belle Cooper