Catalog Search Results
Author
Language
English
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
Author
Series
Language
English
Appears on list
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
5) Hacking
Author
Series
Language
English
Description
"Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers and desktops, web applications,...
Author
Series
Language
English
Description
"Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems...
Author
Language
English
Description
Many libraries set up a training program on conflict resolution and workroom security only after a problem patron situation has become unbearable. Albrecht shows that preparedness is an essential part of library security, on the employee level as well as on the administrative level.
8) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Language
English
Description
Presents an urgent assessment of how governments, businesses, and everyday citizens can counter and prevent attacks by criminal hackers determined to create a digital war zone.
Author
Series
Language
English
Description
"On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another a smaller Airbus A321. At a security checkpoint, TSA agent Bernice Adams finds a postcard of the Golden Gate Bridge bearing an ambiguous--perhaps ominous--message. Her supervisor dismisses her concerns, but Bernice calls security and soon Ben Waterman arrives. A senior Homeland Security agent, still grappling with...
Author
Language
English
Appears on list
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...
11) Security
Author
Language
English
Description
The inventiveness of A Visit from the Goon Squad meets the down-the-rabbit-hole suspense of The Girl on the Train in this chilling, pulse-racing thriller from an electrifying new writer. When the gleaming new Manderly Resort opens in twenty-four hours, Santa Barbara s exclusive cliff-top hotel will offer its patrons the ultimate in luxury and high-tech security. No indulgence has been ignored, no detail overlooked. But all the money in the world can...
Author
Language
English
Description
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you...
Author
Language
English
Description
"Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers a new approach to defending against cyber attacks, one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can."--
Author
Series
Language
English
Description
"For many teens, maintaining a strong social media presence is all about sharing wacky videos with friends, posting fun photographs, or following their favorite bands and brands. What they may not realize is that corporations are mining Facebook, Instagram, Snapchat, and other social media platforms for marketable data. Being too open on social media can also expose teens to other risks, such as identity theft. but this book has readers covered. They'll...
Author
Language
English
Description
Computers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks...
Author
Language
English
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Author
Language
English
Description
"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi,...
Author
Language
English
Description
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective...
20) The red horseman
Author
Series
Language
English
Description
As the USSR collapses, thousands of nuclear warheads may end up in the wrong hands in this thriller from the New York Times–bestselling author of The Art of War.
Jake Grafton has been promoted to deputy director of a new US intelligence agency—and the stakes of his commission are higher than ever before. With the Soviet Union on the brink of dissolution, a vast nuclear arsenal is suddenly ripe
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request