Catalog Search Results
Author
Series
Language
English
Formats
Description
"It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these "white hats" who specializes in ensuring the security of an organization's information systems....
Author
Language
English
Formats
Description
The thrilling memoir of the world's most wanted computer hacker "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's...
Author
Language
English
Formats
Description
"In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your...
Author
Language
English
Formats
Description
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist...
25) Zero days
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
Author
Language
English
Formats
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Author
Language
English
Appears on list
Formats
Description
In this book, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization--inhabiting a variety of roles not traditionally associated with cybersecurity--can contribute to improving its cybersecurity backbone. You'll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You'll also find out how improving...
Author
Series
Pike Logan thrillers volume 17
Language
English
Appears on list
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
29) Sneakers
Language
English
Formats
Description
"Computer expert Martin Bishop heads a team of renegade hackers -- including a former CIA employee, a gadgets wizard, a young genius and a blind soundman -- who are routinely hired to test security systems. But Bishop's past comes back to haunt him when government agents blackmail the 'sneakers' into carrying out a covert operation: tracking down an elusive black box. Along with his former girlfriend, Bishop's team retrieves the box and make a stunning...
Author
Series
Rocky Mountain courage volume 3
Language
English
Description
A cybersecurity specialist with a criminal past joins a troubled federal agent to disarm deadly threats and protect national security secrets hidden in an up-and-coming tech company headquartered in backcountry Montana. Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. When a long-ago partner in crime delivers a...
Author
Language
English
Formats
Description
Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps that both coders and ordinary users of technology can take to improve their computer security. Individual activities explore topics such as encryption,...
Author
Language
English
Formats
Description
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you...
Author
Language
English
Description
"A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells...
Author
Series
Language
English
Formats
Description
In this book, readers will learn expert tips to make sure their passwords are secure and their log-in information is safe. They ll also learn more about the cyberwar that happens every day on the Internet as security experts and malicious hackers do battle. Topics include passwords, encryption, network security, and cyberterrorism. Readers will also learn about the power and importance of really, really big prime numbers. Diagrams and accessible text...
Author
Language
English
Formats
Description
"The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book. Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights...
37) Cybersecurity
Author
Language
English
Formats
Description
Discusses cyber security, describing the history of the internet, the threat hackers pose, and what is being done to protect people from future cyberthreats.
38) Online safety
Author
Series
Language
English
Formats
Description
Perhaps no topic is more crucial for young technology users to understand than how to stay safe online. This vital volume has the most pressing issues facing everyone who uses digital technology today, including maintaining privacy, avoiding cyberbullying, shielding personal information, and using safe and trustworthy websites. It even takes readers through the steps of creating the best passwords for themselves.
Author
Language
English
Formats
Description
Cybercrime is on the rise -- and businesses large and small are at risk. For management, the question is not if you will be targeted, but when. Are you prepared? Is your enterprise actively monitoring networks? Is it taking steps to enable continued operation during an incident? Do you have a recovery plan ready? Digital Resilience lays bare the tactics used by hackers, vulnerabilities lurking in networks, and strategies not just for surviving attacks,...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request