Catalog Search Results
42) Hackers
Author
Series
Language
English
Formats
Description
What are hackers? Are they good? Bad? What can we do to protect ourselves, businesses and society against hackers? How can we control them? And should we try?
Author
Series
Language
English
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
Author
Language
English
Formats
Description
"All our devices and gadgets-from our refrigerators to our home security systems, vacuum cleaners, and stereos-are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration...
Author
Language
English
Formats
Description
Takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats,...
Author
Language
English
Formats
Description
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems,...
Author
Language
English
Description
"From the former news policy lead at Google, an urgent and groundbreaking account of the high-stakes global cyberwar brewing between Western democracies and the autocracies of China and Russia that could potentially crush democracy. From 2016 to 2020, Jacob Helberg led Google's global internal product policy efforts to combat disinformation and foreign interference. During this time, he found himself in the midst of what can only be described as a...
Author
Language
English
Formats
Description
Inexperienced users of computers often jump at the chance to click colorful flashing ads on the sidebar and are also tempted to download files from sites not worthy of trust. In short, people need to learn how to stay safe online. This book will introduce readers to different types of online threats, including viruses and malware. They will learn how different dangers spread and some basic steps to stop or prevent them. Additionally, this book will...
Language
English
Description
Too many of us associate cybersecurity with credit card theft and think the solution is for our banking partners, social media platforms, and large retailers to improve and increase their data security practices. But in the world we live and work in, where our systems are increasingly interconnected and our employees and customers are logging in to access their work or our products from all over the world and on all types of devices, the risk is much...
54) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Language
English
Description
Presents an urgent assessment of how governments, businesses, and everyday citizens can counter and prevent attacks by criminal hackers determined to create a digital war zone.
Author
Language
English
Formats
Description
In Threats: What Every Engineer Should Learn From Star Wars, accomplished security expert and educator Adam Shostack delivers an accessible and engaging discussion of security threats and how to develop secure systems. The book will prepare you to take on the Dark Side as you learn-in a structured and memorable way-about the threats to your systems. You'll move from thinking of security issues as clever one-offs and learn to see the patterns they...
Author
Language
English
Formats
Description
"Fighting Phishing: Everything You Can Do To Fight Social Engineering and Phishing serves as the ideal defense against phishing for any reader, from large organizations to individuals. Unlike most anti-phishing books, which focus only on one or two strategies, this book discusses all the policies, education, and technical strategies that are essential to a complete phishing defense. This book gives clear instructions for deploying a great defense-in-depth...
Author
Language
English
Formats
Description
"The United States may seem safe from within but beyond its borders, a new enemy rises. An American ship has vanished. The president has tasked the new cyber-intelligence agency, Net Force, with finding out what happened to the vessel. But their investigation reveals a plan that could trigger a world war. Their only option is to strike first. Through the streets of New York, a secret city in Crimea and the depths of the South China Seas, Net Force...
Author
Language
English
Formats
Description
"Companies are investing an unprecedented amount of money to keep their data and assets safe, yet cyberattacks are on the rise--and the problem is worsening. No amount of technology, resources, or policies will reverse this trend. Only sound governance, originating with the board, can turn the tide. Protection against cyberattacks can't be treated as a problem solely belonging to an IT or cybersecurity department. It needs to cast a wide and impenetrable...
Author
Language
English
Formats
Description
"Facing Cyber Threats Head On explains battle against hackers as a fight between people, not technologies. Brian Minick offers a new approach to defending against cyber attacks, one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can."--
Author
Series
Language
English
Formats
Description
This book examines how people can become targets for cybercriminals, the dangers of identity theft, and how people can protect their financial data from attacks. Features include worksheets, key takeaways, a glossary, further readings, websites, source notes, and an index. Aligned to Common Core Standards and correlated to state standards.
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request