Catalog Search Results
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Appears on list
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Language
English
Description
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a...
3) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Language
English
Description
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them...
Author
Language
English
Description
Just how secure is your computer? Protecting your computer is like defending a medieval castle: moats and castle guards can be effective, but you'd bankrupt the kingdom trying to build something dragon-proof. Parker shows you dozens of no-brainer things we should all be doing to protect our computers and safeguard our data.
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Language
English
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
8) Zero days
Author
Language
English
Appears on these lists
Description
Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect-her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer.
Author
Language
English
Description
Understand how Zero Trust security can and should integrate into your organization. This book covers the complexity of enterprise environments and provides the realistic guidance and requirements your security team needs to successfully plan and execute a journey to Zero Trust while getting more value from your existing enterprise security architecture. After reading this book, you will be ready to design a credible and defensible Zero Trust security...
Author
Language
English
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Author
Language
English
Description
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist...
Author
Series
Rocky Mountain courage volume 3
Language
English
Description
A cybersecurity specialist with a criminal past joins a troubled federal agent to disarm deadly threats and protect national security secrets hidden in an up-and-coming tech company headquartered in backcountry Montana. Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. When a long-ago partner in crime delivers a...
Author
Language
English
Description
Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps that both coders and ordinary users of technology can take to improve their computer security. Individual activities explore topics such as encryption,...
Author
Series
Language
English
Description
In this book, readers will learn expert tips to make sure their passwords are secure and their log-in information is safe. They ll also learn more about the cyberwar that happens every day on the Internet as security experts and malicious hackers do battle. Topics include passwords, encryption, network security, and cyberterrorism. Readers will also learn about the power and importance of really, really big prime numbers. Diagrams and accessible text...
Author
Language
English
Description
"The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights...
16) Cybersecurity
Author
Language
English
Description
Discusses cyber security, describing the history of the internet, the threat hackers pose, and what is being done to protect people from future cyberthreats.
17) Online safety
Author
Series
Language
English
Description
Perhaps no topic is more crucial for young technology users to understand than how to stay safe online. This vital volume has the most pressing issues facing everyone who uses digital technology today, including maintaining privacy, avoiding cyberbullying, shielding personal information, and using safe and trustworthy websites. It even takes readers through the steps of creating the best passwords for themselves.
18) Hackers
Author
Series
Language
English
Description
What are hackers? Are they good? Bad? What can we do to protect ourselves, businesses and society against hackers? How can we control them? And should we try?
Author
Language
English
Description
Inexperienced users of computers often jump at the chance to click colorful flashing ads on the sidebar and are also tempted to download files from sites not worthy of trust. In short, people need to learn how to stay safe online. This book will introduce readers to different types of online threats, including viruses and malware. They will learn how different dangers spread and some basic steps to stop or prevent them. Additionally, this book will...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request