Catalog Search Results
Author
Language
English
Formats
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
Author
Series
Language
English
Appears on list
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
3) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Appears on list
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
4) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Appears on list
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Language
English
Description
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a...
6) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
7) Zero days
Author
Language
English
Appears on these lists
Description
Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect-her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer.
Author
Language
English
Description
In "Navigating the Cybersecurity Career Path", decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
Author
Language
English
Formats
Description
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them...
10) Hacking
Author
Series
Language
English
Description
"Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers and desktops, web applications,...
Author
Series
Language
English
Description
"Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems...
Author
Language
English
Formats
Description
Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our computers and safeguard our data.
Author
Language
English
Formats
Description
Key Strategies to Safeguard Your FutureWell Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it's a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered--literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception--drawn from knowledge the...
14) Digital fortress
Author
Language
English
Description
A computer whiz takes on the government in defense of the right to privacy. On hearing the National Security Agency has secretly installed a program that can read anyone's e-mail, Ensei Tankado comes up with a program to paralyze it. A conflict ensues and people die.
Author
Language
English
Formats
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Language
English
Description
This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating both targeted and opportunistic attacks.--
Author
Language
English
Formats
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
Author
Language
English
Formats
Description
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to...
Author
Language
English
Formats
Description
Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request