Catalog Search Results
1) Firewalls don't stop dragons: a step-by-step guide to computer security and privacy for non-techies
Author
Language
English
Formats
Description
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats,...
2) Sneakers
Publisher
Universal
Language
English
Formats
Description
A thriller about five computer hackers with questionable pasts and an equally questionable government job.
Author
Series
Language
English
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Language
English
Formats
Description
"Combating cybercrime is a necessity of doing business in the twenty-first century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager. In Fire Doesn't Innovate, cybersecurity expert Kip...
Author
Publisher
Princeton University Press
Pub. Date
[2017]
Language
English
Description
"The Mathematics of Secrets takes readers on a tour of the mathematics behind cryptography--the science of sending secret messages. Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers operate, as he focuses on both code making and code breaking. He discusses the majority of ancient and modern ciphers currently known, beginning by looking at substitution ciphers, built by substituting one letter or block...
Author
Language
English
Formats
Description
"Cybersecurity is of huge concern from start-ups to established businesses. This title provides steps that start-ups can follow to protect their business from a cyberattack The book will cover everything an entrepreneur and venture capitalist should know when building a secure company in today's world. It will take them through landing their first A round of funding and then a successful exit. The book describes how to include security and privacy...
7) Zero days
Author
Language
English
Appears on list
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Language
English
Description
Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's...
9) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
11) Hacking
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
[2022]
Language
English
Description
"Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more."--
Author
Publisher
PublicAffairs
Pub. Date
2019.
Language
English
Description
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom -- even democracy itself.
"Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique...
Author
Series
Language
English
Formats
Description
Cloud technology has changed the way we approach technology. It’s also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data. Using the practical techniques discussed in Cloud Security For Dummies, you’ll mitigate the risk of a data breach by building security...
15) Cybersecurity
Author
Series
Publisher
Bearport Publishing Company
Pub. Date
[2023]
Language
English
Description
"Computers hold all kinds of important information for individuals, businesses, and beyond. Cybersecurity is needed to keep that information safe from hackers and other threats. As computer technology advances, cybersecurity must keep up. Explore how cybersecurity works, what threatens cybersecurity, and how this technology helps people. It's a key current events topic made approachable for all!"--
Author
Language
English
Formats
Description
"The United States may seem safe from within but beyond its borders, a new enemy rises. An American ship has vanished. The president has tasked the new cyber-intelligence agency, Net Force, with finding out what happened to the vessel. But their investigation reveals a plan that could trigger a world war. Their only option is to strike first. Through the streets of New York, a secret city in Crimea and the depths of the South China Seas, Net Force...
Author
Publisher
Page Two Books
Pub. Date
[2020]
Language
English
Description
"Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go...
Author
Publisher
Rowman & Littlefield
Pub. Date
[2020]
Language
English
Description
"Based on insider accounts and exclusive interviews with experts, "Cyber in the Age of Trump" offers a first-time chronicle and analysis of the Trump administration's approach to cybersecurity, its curious decisions and strategic choices, places where its work has earned applause, and the places where cyber pros see major signs of danger"--
20) Zero days
Publisher
Magnolia Home Entertainment
Pub. Date
[2017]
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
Didn't find it?
Can't find what you are looking for? Try submitting a purchase suggestion. Submit Request