- Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare
- Ethical Hacking: The Ultimate Beginner's Guide to Using Penetration Testing to Audit and Improve the Cybersecurity of Computer Networks, Including Tips on Social Engineering
- How the internet is held together with a pinky swear
- How hackers use raunchy photos to eke out private information
- Examples of preposterous social engineering attacks
- Equally preposterous defense from those attacks
- How people in charge don't even realize what hacking means
- How there's only one surefire way to protect against hacking
- Research on past, present, and future hacking methods
- Difference between good and bad hackers
- How to lower your exposure to hacking
- Why companies pester you to attach a phone number to an account
- Why social media is the most insecure way to spend your afternoon
- And much, much more
- Fighting against companies
- Ethical Hacking Defined
- War on the internet
- Engineer's mind
- The Almighty EULA
- The danger of defaults
- John Deere
- Copyright
- YouTube ContentID
- Tracking users
- DRM
- GEMA, the copyright police
- Torrents
- Sports channels
- Megaupload and Anonymous
- Julian Assange
- Patents
- Penetration testing
- Jailbreaking Android/iPhone
- Shut up Cortana
- How an hacker could go about hacking your WiFi
- And much, much more!