Catalog Search Results
Author
Language
English
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
2) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Appears on list
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
3) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Appears on list
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Language
English
Description
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a...
5) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Language
English
Description
Key Strategies to Safeguard Your FutureWell Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it's a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered--literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception--drawn from knowledge the...
Author
Language
English
Description
A computer whiz takes on the government in defense of the right to privacy. On hearing the National Security Agency has secretly installed a program that can read anyone's e-mail, Ensei Tankado comes up with a program to paralyze it. A conflict ensues and people die.
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Language
English
Description
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to...
Author
Series
Language
English
Description
"It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these "white hats" who specializes in ensuring the security of an organization's information systems....
12) Zero days
Author
Language
English
Appears on these lists
Description
Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect-her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer.
Author
Language
English
Description
"In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your...
Author
Language
English
Description
In this book, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization--inhabiting a variety of roles not traditionally associated with cybersecurity--can contribute to improving its cybersecurity backbone. You'll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You'll also find out how improving...
Author
Series
Rocky Mountain courage volume 3
Language
English
Description
A cybersecurity specialist with a criminal past joins a troubled federal agent to disarm deadly threats and protect national security secrets hidden in an up-and-coming tech company headquartered in backcountry Montana. Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. When a long-ago partner in crime delivers a...
Author
Language
English
Description
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you...
Author
Language
English
Description
Cybercrime is on the rise -- and businesses large and small are at risk. For management, the question is not if you will be targeted, but when. Are you prepared? Is your enterprise actively monitoring networks? Is it taking steps to enable continued operation during an incident? Do you have a recovery plan ready? Digital Resilience lays bare the tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks,...
Author
Language
English
Description
Takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats,...
Author
Language
English
Description
"All our devices and gadgets-from our refrigerators to our home security systems, vacuum cleaners, and stereos-are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request