Catalog Search Results
Author
Series
Language
English
Formats
Description
This comprehensive career guide helps readers take a close look at coding as a career path and gives them a long, actionable list for turning their interests into a career across a variety of fields. Whether a student is interested in games, engineering, design, or systems administration, each career path comes with a detailed list of resources and first-person accounts from professionals in the field. This guide is all a coding enthusiast needs to...
Language
English
Description
Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious, and cybercriminals want it. From the sleuths who decoded the world₂s most advanced cyber weapon to scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge science, all to stay one step ahead of the hackers.
Author
Language
English
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Author
Series
Language
English
Formats
Description
"Organizations in every industry from healthcare to finance rely on cybersecurity professionals to protect one of their most valuable assets - information. For those interested in both high-tech security and computer science, there are many roles and career opportunities from designing network security systems to conducting penetration testing to identifying security weaknesses. This book examines several of those careers, highlighting different jobs,...
85) 26 below
Author
Series
Language
English
Formats
Description
"In her new role as Emergency Operations Center director for Fairbanks, Alaska, Darcie Phillips prevents disasters. But none of her training can prepare her for the terror that's coming. As a cybersecurity specialist, Jason Myers is determined to ferret out any threats to the town he now calls home--and that includes his reckless brother and his ecoterrorist friends. When an old woman's wild prediction--widespread destruction as soon as the Fairbanks...
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Language
English
Formats
Description
You are under surveillance right now. Your cell phone provider tracks your location, your online and in-store purchasing patterns are recorded, Facebook can determine your sexual orientation without you ever mentioning it. Corporations use surveillance to manipulate the prices we're offered; governments use surveillance to discriminate, censor, and put people in danger worldwide. Schneier shows what we can do to reform our government surveillance...
89) The cybersecurity playbook: how every leader and employee can contribute to a culture of security
Author
Language
English
Formats
Description
"Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next...
Author
Language
English
Description
"Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
Author
Series
Language
English
Formats
Description
Growing up, Hudson Warner was Amanda Smith's protector. But after they became teenage sweethearts, Hudson left to pursue his ambitions. Now the tech expert receives an appeal from Amanda to help find her missing daughter. As they frantically search and face danger together, old feelings are revived. But can Hudson trust Amanda when he discovers who the child he's searching for really is?
Author
Series
Language
English
Formats
Description
Most people sign on to one or more social media accounts every day without giving much thought to how these services are offered for free. This timely volume explains to readers how social media sites use their personal data to make a profit. By explaining how advertising targets specific demographic groups and how big data firms make use of individuals' information, this book gives readers a clear understanding of their place in the social media...
Author
Language
English
Formats
Description
"A cybersecurity expert and former FBI "ghost" tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets....
95) Spyder web
Author
Series
Nolan Kilkenny novels volume 1
Language
English
Description
They call it Spyder: a supposedly undetectable intelligence-gathering computer program that can easily penetrate heavily-encrypted computer networks. When ex-Navy SEAL Nolan Kilkenny discovers its existence, Spyder has already been stolen by three indusrial spies in a heist that quickly escalates to murder and treason. Suddenly, Kilkenny is leading the FBI and CIA in the search for Spyder... and is in the crosshairs of those who will stop at nothing...
96) Ethical hacker
Author
Series
Language
English
Formats
Description
From the interesting and intriguing to the weird and wonderful Odd Jobs: Ethical Hacker is HIGH interest combined with a LOW level of complexity to help struggling readers along. The carefully written, considerate text will hold readers' interest and allow for successful mastery, understanding, and enjoyment of reading about Ethic Hackers. Clear, full-color photographs with captions provide additional accessible information. A table of contents, glossary...
Author
Language
English
Formats
Description
The thrilling memoir of the world's most wanted computer hacker "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's...
98) CISSP
Author
Series
Language
English
Description
If you're a security professional seeking your CISSP certification, this book is a perfect way to prepare for the exam. Covering in detail all eight domains, the expert advice inside gives you the key information you'll need to pass the exam. Plus, you'll get tips on setting up a 60-day study plan, tips for exam day, and access to an online test bank of questions. CISSP For Dummies is fully updated and reorganized to reflect upcoming changes (ISC)2...
99) Cyfrowa twierdza
Author
Language
Polish
Formats
Description
Gdy najbardziej technologicznie zaawansowana maszyna NSA do łamania kodów napotyka tajemniczy szyfr, którego nie jest w stanie złamać, agencja wzywa głównego kryptologa, Susan Fletcher, piękną i zdolną panią matematyk. Udaje jej się odkryć coś, co zatrzęsie posadami szefów NSA. Agencja staje się zakładnikiem szantażowanym nie bronią czy bombą, ale szyfrem tak genialnie skomplikowanym, że mógłby sparaliżować amerykański
...Author
Language
English
Formats
Description
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, youll shift your focus to network forensics, where you cover the various tools available to make your network forensics process less complicated. Following...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request