Best Internet & Telecommunications Books

1. The Personal Internet Address & Password Logbook (removable cover band for security)

Author: by Inc. Peter Pauper Press
Peter Pauper Press
English
160 pages

View on Amazon

Tired of losing track of the websites you visit (whether frequently or infrequently), along with all those usernames and passwords? Now you can keep them all in one convenient place! This time- and headache-saving little volume is organized with tabbed A to Z pages, with space to list websites, usernames, passwords, and extra notes.

You can also record notes on home network configurations, software license numbers, etc., too, in pages in the back of the book. An elastic band attached to the back cover keeps your place or keeps logbook closed. Removable label makes logbook discreet.

Logbook makes a practical accessory for home or office. 4-1/4” wide x 5-3/4” high.144 pages.


2. (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide

Author: by Mike Chapple
Sybex
English
1248 pages

View on Amazon

CISSP Study Guide – fully updated for the 2021 CISSP Body of Knowledge (ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated based on the latest 2021 CISSP Exam Outline. This bestselling Sybex Study Guide covers 100% of the exam objectives.

You’ll prepare for the exam smarter and faster with Sybex thanks to expert content, knowledge from our real-world experience, advice on mastering this adaptive exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you’ve learned with key topic exam essentials and chapter review questions.

The three co-authors of this book bring decades of experience as cybersecurity practitioners and educators, integrating real-world expertise with the practical knowledge you’ll need to successfully pass the CISSP exam. Combined, they’ve taught cybersecurity concepts to millions of students through their books, video courses, and live training programs.


3. Extreme Privacy: What It Takes to Disappear

Author: by Michael Bazzell
B094LDWKGZ
English
639 pages

View on Amazon

Completely rewritten Third Edition (2021) presents the definitive 635-page privacy manual. Michael Bazzell has helped hundreds of celebrities, billionaires, and everyday citizens completely disappear from public view. He is now known in Hollywood as the guy that fixes things. His previous books about privacy were mostly REACTIVE and he focused on ways to hide information, clean up an online presence, and sanitize public records to avoid unwanted exposure.

This textbook is PROACTIVE. It is about starting over. It is the complete guide that he would give to any new client in an extreme situation. It leaves nothing out, and provides explicit details of every step he takes to make someone completely disappear, including document templates and a chronological order of events.

The information shared in this volume is based on real experiences with his actual clients, and is unlike any content ever released in his other books.


4. Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

Author: by Michael Bazzell
B08RRDTFF9
English
666 pages

View on Amazon

Completely rewritten 8th edition (2021) contains over 650 pages throughout 31 chapters! It is time to look at OSINT in a different way. For many years, and within the previous editions of this book, we have relied on external resources to supply our search tools, virtual environments, and investigation techniques.

We have seen this protocol fail us when services shut down, websites disappear, and custom resources are dismantled due to outside pressures. This book aims to correct our dilemma. We will take control of our investigative resources and become self-reliant.

There will be no more need for online search tools; we will make and host our own locally. We will no longer seek pre-built virtual machines; we will create and configure our own. This book puts the power back in your hands.

The new OSINT professional must be self-sustaining and possess their own tools and resources. You will become a more proficient subject matter expert who will be armed with the knowledge and readiness to articulate the sources of your findings. This new eighth edition contains hundreds of pages which have been updated to keep your OSINT investigative methods fresh.


5. Office 365 All-in-One For Dummies

Author: by Peter Weverka
For Dummies
English
848 pages

View on Amazon

The deepest reference on Microsoft’s productivity service Office 365 offers the same productivity power as past versions of Microsoft Office along with tools designed to boost collaboration in the workplace and instant access to the latest Office updates without buying a whole new software package.

It’s an ideal solution for both the office and home use. The author of the bestselling Office All-in-One For Dummies shares his advice on how to navigate the nuts and bolts of getting things done with Office 365. Look inside for step-by-step instructions on Excel, Outlook, Word, PowerPoint, Access, and OneNote along with a dive into the cloud services that come with Office 365.

Access Office 365 Make sense of common Office tasks Use Excel, Word, outlook, PowerPoint and more Take advantage of 365 online services If you’re a home or business user interested in having a complete reference on the suite, this book has you covered.


6. CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601))

Author: by Wm. Arthur Conklin
McGraw-Hill Education
English
784 pages

View on Amazon

This fully updated study guide covers every topic on the current version of the CompTIA Security+ examGet complete coverage of all objectives included on the CompTIA Security+ exam SY0-601 from this comprehensive resource. Written by a team of leading information security experts, this authoritative guide fully addresses the skills required to perform essential security functions and to secure hardware, systems, and software.

You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. Covers all exam domains, including:Threats, Attacks, and VulnerabilitiesArchitecture and DesignImplementationOperations and Incident ResponseGovernance, Risk, and ComplianceOnline content includes:250 practice exam questionsTest engine that provides full-length practice exams and customizable quizzes by chapter or by exam domain


7. Password Book: Personal Internet and Password Keeper and Organizer for Usernames, Logins and Web Addresses. Suitable for Home and Office (Alphabetically sorted)

Author: by Safe & Sound Publishing
B08XLGFTF5
English
106 pages

View on Amazon

Are you suffering from too many brain farts ? Are you tired of forgetting passwords to every website you visit ? This high quality password log book is the perfect solution for you. Slick, elegant and perfectly sized to keep all of your secrets in a safe and easy to use space.

Features:Dimensions: 6″ x 9″Pages: 105Cover: MatteAlphabetically arrengedHome network settings and ISP informations sectionsHigh quality printMake your life a little easier and get your new password booklet NOW !


8. Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)

Author: by Mike Meyers
McGraw-Hill Education
English
832 pages

View on Amazon

An up-to-date CompTIA Security+ exam guide from training and exam preparation guru Mike MeyersIn Mike Meyers’ CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601), the leading expert on CompTIA certification and training brings his highly effective methodology to IT security.

Within each chapter, modules drill down on specific exam objectives, providing a clear learning path. All official exam objectives are covered, and chapter-ending practice exam questions reinforce the concepts presented. This practical resource goes beyond knowledge application and teaches you the skills you need to anticipate security risks and guard against them.

Covers all the exam topics, including:Risk managementCryptographyAuthentication and authorizationHost, LAN, and application securityWireless, cloud, and mobile securityEnvironmental security and controlsOnline content includes:200+ practice exam questions in a customizable test engineOne hour+ of video training from Mike MeyersFree lab simulationsMike’s toolbox of favorite network securityrelated freeware and shareware


9. Atlas of AI: Power, Politics, and the Planetary Costs of Artificial Intelligence

Author: by Kate Crawford
English
336 pages
0300209576

View on Amazon

The hidden costs of artificial intelligence, from natural resources and labor to privacy, equality, and freedom”This study argues that [artificial intelligence] is neither artificial nor particularly intelligent…. A fascinating history of the data on which machine-learning systems are trained.”New Yorker”A valuable corrective to much of the hype surrounding AI and a useful instruction manual for the future.”John Thornhill, Financial Times What happens when artificial intelligence saturates political life and depletes the planet?

How is AI shaping our understanding of ourselves and our societies? Drawing on more than a decade of research, awardwinning scholar Kate Crawford reveals how AI is a technology of extraction: from the minerals drawn from the earth, to the labor pulled from low-wage information workers, to the data taken from every action and expression.

This book reveals how this planetary network is fueling a shift toward undemocratic governance and increased inequity. Rather than taking a narrow focus on code and algorithms, Crawford offers us a material and political perspective on what it takes to make AI and how it centralizes power.

10. Hacking: The Art of Exploitation, 2nd Edition

Author: by Jon Erickson
English
488 pages
1593271441

View on Amazon

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker’s perspective.

The included LiveCD provides a complete Linux programming and debugging environmentall without modifying your current operating system. Use it to follow along with the book’s examples as you fill gaps in your knowledge and explore hacking techniques on your own.

Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to: Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server’s logging behavior to hide your presence Redirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrixHackers are always pushing the boundaries, investigating the unknown, and evolving their art.

11. The Shallows: What the Internet Is Doing to Our Brains

Author: by Nicholas Carr
English
320 pages
0393357821

View on Amazon

New York Times bestseller Finalist for the Pulitzer Prize This is a book to shake up the world. Ann Patchett Nicholas Carr’s bestseller The Shallows has become a foundational book in one of the most important debates of our time: As we enjoy the internet’s bounties, are we sacrificing our ability to read and think deeply?

This 10th-anniversary edition includes a new afterword that brings the story up to date, with a deep examination of the cognitive and behavioral effects of smartphones and social media.

12. AWS Certified Cloud Practitioner Study Guide: CLF-C01 Exam

Author: by Ben Piper
Sybex
English
304 pages

View on Amazon

Set yourself apart by becoming an AWS Certified Cloud Practitioner Take the next step in your career by expanding and validating your skills on the Amazon Web Services (AWS) Cloud. The AWS Certified Cloud Practitioner Study Guide: Exam CLF-C01 provides a solid introduction to this industry-leading technology, relied upon by thousands of businesses across the globe, as well as the resources you need to prove your knowledge in the AWS Certification Exam.

This guide offers complete and thorough treatment of all topics included in the exam, beginning with a discussion of what the AWS cloud is and its basic global infrastructure and architectural principles. Other chapters dive into the technical, exploring core characteristics of deploying and operating in the AWS Cloud Platform, as well as basic security and compliance aspects and the shared security model.

In addition, the text identifies sources of documentation or technical assistance, such as white papers or support tickets. To complete their coverage, the authors discuss the AWS Cloud value proposition and define billing, account management, and pricing models. This includes describing the key services AWS can provide and their common use cases (e.G., compute, analytics, etc..

13. Internet Password Logbook (Cognac Leatherette): Keep track of: usernames, passwords, web addresses in one easy & organized location

Author: by Editors of Rock Point
Rock Point
English
128 pages

View on Amazon

Just say no to piles of sticky notes and scraps of paper with your passwords and logins! Keep track of them in this elegant, yet inconspicuous, alphabetically tabbed cognac leatherette notebook. In this 4 6 hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers.

You’ll find: Internet password safety and naming tipsA to Z tabbed pages with space to list website, username, and five passwords for eachDedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly feeDedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wirelessA notes section with blank lined pages This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.

14. The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data

Author: by Kevin Mitnick
Back Bay Books
English
320 pages

View on Amazon

Real-world advice on how to be invisible online from “the FBI’s most wanted hacker” (Wired). Be online without leaving a trace. Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you “the art of invisibility” – online and real-world tactics to protect you and your family, using easy step-by-step instructions.

Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity. Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

The world’s most famous – and formerly the US government’s most wanted – computer hacker, he has hacked into some of the country’s most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI.

15. Cybersecurity For Dummies

Author: by Joseph Steinberg
For Dummies

English
368 pages

View on Amazon

Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being “cyber-secure” means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked.

If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You’ll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!

The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime and to defend yourself before it is too late.

16. (ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests

Author: by Mike Chapple
Sybex
English
496 pages

View on Amazon

Full-length practice tests covering all CISSP domains for the ultimate exam prep The (ISC)2 CISSP Official Practice Tests is a major resource for (ISC)2 Certified Information Systems Security Professional (CISSP) candidates, providing 1300 unique practice questions. The first part of the book provides 100 questions per domain.

You also have access to four unique 125-question practice exams to help you master the material. As the only official practice tests endorsed by (ISC)2, this book gives you the advantage of full and complete preparation. These practice tests align with the 2021 version of the exam to ensure up-to-date preparation, and are designed to cover what you will see on exam day.

Coverage includes: Security and Risk Management, Asset Security, Security Architecture and Engineering, Communication and Network Security, Identity and Access Management (IAM), Security Assessment and Testing, Security Operations, and Software Development Security. The CISSP credential signifies a body of knowledge and a set of guaranteed skills that put you in demand in the marketplace.