Catalog Search Results
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Language
English
Formats
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
Author
Series
Language
English
Appears on list
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Series
Language
English
Description
"On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another a smaller Airbus A321. At a security checkpoint, TSA agent Bernice Adams finds a postcard of the Golden Gate Bridge bearing an ambiguous--perhaps ominous--message. Her supervisor dismisses her concerns, but Bernice calls security and soon Ben Waterman arrives. A senior Homeland Security agent, still grappling with...
Author
Language
English
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Language
English
Description
"A fun and informative illustrated kids' guide to safely and productively navigating the digital landscape. Cellphones have become a fact of life, with children as young as eight (yes, eight!) getting their very own "devices." Such boundless access means our kids are in nearly constant contact with technology that was designed specifically for adults. And they're doing so without any type of road map. Enter First Phone: the essential book that apprehensive...
Author
Language
English
Appears on list
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...
10) Cloud security
Author
Series
Language
English
Description
"Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data"--Publisher's description.
Author
Language
English
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Author
Language
English
Description
"Harden your business against internal and external cybersecurity threats with a single accessible resource. In 8 Steps to Better Security: A Simple Cyber Resilience Guide for Business, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi,...
Author
Language
English
Appears on list
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
Author
Language
English
Formats
Description
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective...
Author
Language
English
Formats
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Language
English
Formats
Description
Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that...
Series
Language
English
Description
This volume explores the topic of airport security by presenting varied expert opinions that examine many of the different aspects that surround this issue. The editors investigate topics such as the effectiveness of airport security, if passenger profiling is a legitimate security strategy, and also the ongoing issues with the security process. The viewpoints are selected from a wide range of highly respected and often hard-to-find sources and publications....
18) The red horseman
Author
Series
Language
English
Description
As the USSR collapses, thousands of nuclear warheads may end up in the wrong hands in this thriller from the New York Times–bestselling author of The Art of War.
Jake Grafton has been promoted to deputy director of a new US intelligence agency—and the stakes of his commission are higher than ever before. With the Soviet Union on the brink of dissolution, a vast nuclear arsenal is suddenly ripe
Author
Language
English
Description
"All our devices and gadgets-from our refrigerators to our home security systems, vacuum cleaners, and stereos-are going online, just like our computers did. But once we've successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It's Smart, It's Vulnerable, veteran cybersecurity professional Mikko Hypponen delivers an eye-opening exploration...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request