Catalog Search Results
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Series
Language
English
Appears on list
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Series
Language
English
Description
"On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another a smaller Airbus A321. At a security checkpoint, TSA agent Bernice Adams finds a postcard of the Golden Gate Bridge bearing an ambiguous--perhaps ominous--message. Her supervisor dismisses her concerns, but Bernice calls security and soon Ben Waterman arrives. A senior Homeland Security agent, still grappling with...
5) Hacking
Author
Series
Language
English
Description
"Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers and desktops, web applications,...
Author
Series
Language
English
Description
"Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems...
Author
Language
English
Description
Many libraries set up a training program on conflict resolution and workroom security only after a problem patron situation has become unbearable. Albrecht shows that preparedness is an essential part of library security, on the employee level as well as on the administrative level.
Author
Language
English
Formats
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
9) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Language
English
Description
Presents an urgent assessment of how governments, businesses, and everyday citizens can counter and prevent attacks by criminal hackers determined to create a digital war zone.
Author
Language
English
Description
"This practical go-to guide highlights all the risks kids face when they chat online, share selfies, use apps, and explore the Internet. International security expert Will Geddes answers difficult questions from worried parents and gives simple action plans, preventative steps, and advice on how to recognize the warning signs"--Back cover.
Author
Language
English
Description
"A fun and informative illustrated kids' guide to safely and productively navigating the digital landscape. Cellphones have become a fact of life, with children as young as eight (yes, eight!) getting their very own "devices." Such boundless access means our kids are in nearly constant contact with technology that was designed specifically for adults. And they're doing so without any type of road map. Enter First Phone: the essential book that apprehensive...
Author
Language
English
Appears on list
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...
Author
Language
English
Description
The rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you...
14) The red horseman
Author
Series
Language
English
Description
As the USSR collapses, thousands of nuclear warheads may end up in the wrong hands in this thriller from the New York Times–bestselling author of The Art of War.
Jake Grafton has been promoted to deputy director of a new US intelligence agency—and the stakes of his commission are higher than ever before. With the Soviet Union on the brink of dissolution, a vast nuclear arsenal is suddenly ripe
Author
Language
English
Description
Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that...
Author
Language
English
Formats
Description
The thrilling memoir of the world's most wanted computer hacker "Mitnick manages to make breaking computer code sound as action-packed as robbing a bank." -- NPR Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies--and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's...
19) 10 don'ts on your digital devices: the non-techie's survival guide to cyber security and privacy
Author
Language
English
Description
"In nontechnical language and engaging style, [this] explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. It's a wonderful thing to be able to use any of your cloud-synced...
Author
Language
English
Description
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by...