Catalog Search Results
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Series
Language
English
Description
"On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another a smaller Airbus A321. At a security checkpoint, TSA agent Bernice Adams finds a postcard of the Golden Gate Bridge bearing an ambiguous--perhaps ominous--message. Her supervisor dismisses her concerns, but Bernice calls security and soon Ben Waterman arrives. A senior Homeland Security agent, still grappling with...
3) Security
Author
Language
English
Description
The inventiveness of A Visit from the Goon Squad meets the down-the-rabbit-hole suspense of The Girl on the Train in this chilling, pulse-racing thriller from an electrifying new writer. When the gleaming new Manderly Resort opens in twenty-four hours, Santa Barbara s exclusive cliff-top hotel will offer its patrons the ultimate in luxury and high-tech security. No indulgence has been ignored, no detail overlooked. But all the money in the world can...
Author
Language
English
Description
"Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers a new approach to defending against cyber attacks, one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can."--
Author
Series
Language
English
Description
"For many teens, maintaining a strong social media presence is all about sharing wacky videos with friends, posting fun photographs, or following their favorite bands and brands. What they may not realize is that corporations are mining Facebook, Instagram, Snapchat, and other social media platforms for marketable data. Being too open on social media can also expose teens to other risks, such as identity theft. but this book has readers covered. They'll...
Author
Language
English
Description
Computers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks...
Author
Language
English
Description
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective...
Author
Series
Language
English
Description
As the USSR collapses, thousands of nuclear warheads may end up in the wrong hands in this thriller from the New York Times–bestselling author of The Art of War.
Jake Grafton has been promoted to deputy director of a new US intelligence agency—and the stakes of his commission are higher than ever before. With the Soviet Union on the brink of dissolution, a vast nuclear arsenal is suddenly ripe
Author
Language
English
Description
Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that...
Author
Language
English
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Language
English
Description
Everyone is affected by credit card fraud, if they are aware of it or not. Every day there are a variety of ways that scams and fraudsters can get your card and personal information. Today so much business occurs over the Internet or via the phone where no card is present. What can start as a seemingly legitimate purchase can easily turn into fraudulent charges — or worse, sometimes a physical confrontation, when a criminal steals a credit card...
Author
Series
Language
English
Description
Readers will learn about the importance of appropriate and safe use of technology in Social Media And The Internet. This title includes full-color photographs, vocabulary, comprehension and extension activities, and more to enhance readers' comprehension and application skills. The Social Skills series helps young readers learn how to handle the many different situations they'll face as they grow. Each 24-page book features real-world examples, tips,...
Author
Language
English
Description
"The explosive inside account of the attack against the U.S. diplomatic and intelligence outposts in Benghazi, Libya On the night of September 11, 2012, the American diplomatic mission at Benghazi, Libya, came under ferocious attack by a heavily armed group of Islamic terrorists. The prolonged firefight, and the attack hours later on a nearby CIA outpost, resulted in the deaths of four Americans, including the American ambassador to Libya, Christopher...
Author
Language
English
Description
As cyberattacks on computers and other digital devices have proliferated worldwide, so too has the need for cybersecurity analysts. Incidents of hacking and data theft have created higher demand than ever for these professionals. What the job entails, what it pays, and future prospects are discussed along with insights from industry insiders.
16) Internet Safety
Author
Series
Language
English
Description
"Technology and media fuel the world today, and the Internet is a big part of that. Along with using the Internet comes the added responsibility of following certain rules and staying safe. Readers of this essential volume learn why it is so important to stay protected online. They'll see how the choices they make might seem harmless in the moment, but could actually have severe consequences. Concise, accessible text is paired with vibrant illustrations...
Author
Language
English
Description
"As the US capitol was attacked on January 6, 2021, the White House went dark for seven hours and thirty-seven minutes. It was my job to turn the lights on. The void happened to overlap with the hours when supporters of former President Trump brawled with police, smashed windows, and rampaged through the halls of Congress as his loss to Joe Biden was being certified. Why the White House went dark, I didn't know, and, in fact, I didn't really care....
Author
Language
English
Description
"This book explains how attackers leverage human psychology and publicly available information to target and exploit victims, and outlines ways to defend against social engineering attacks. It explores the ethical decision-making process of the social engineer when implementing a phishing engagement. Includes case studies throughout"--
20) One wrong move
Author
Series
Jeopardy falls volume 1
Language
English
Appears on list
Description
"Christian O'Brady was pulled into a life of crime at a young age by his con artist parents. Now making amends for his corrupt past, he has become one of the country's foremost security experts. When a string of Southwestern art heists targets one of the galleries Christian secured, he is paired up with a gifted insurance investigator who has her own checkered past. Andi Forester was a brilliant FBI forensic analyst until one of her colleagues destroyed...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request