Search:

Viruses and spam / by Day-MacLeod, Deirdre,author.(CARDINAL)669555;
Includes bibliographical references (pages 42-45) and index.Accelerated Reader AR
Subjects: Computer crimes.; Computer security.; Cyberterrorism.;
Available copies: 1 / Total copies: 1
unAPI

Cyber crisis : protecting your business from real threats in the virtual world / by Cole, Eric,author.(CARDINAL)222723;
Introduction: The current reality -- We are all targets -- We live in cyberspace -- The hackers are here -- Mobile weaknesses -- Your life, hanging in the Cloud -- They're in your business -- National infrastructure attack -- Cyberspace: a place with no borders -- Surviving the cyber crisis -- Conclusion: Ten lessons to remember."From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection"--Today, we live our lives and conduct our business online. Our data is shuttled over public Wi-Fi and company networks. We rely on passwords and encryption and private servers, IT departments and best practices. Cybersecurity attacks have increased exponentially, but because they're stealthy and often invisible, many underplay, ignore, or simply don't realize the danger. Cole gives readers a clear picture of the information war, and offers practical, actionable advice that even those with little technical background can implement. -- adapted from jacket
Subjects: Cyberterrorism.; Computer crimes.; Computer security.;
Available copies: 7 / Total copies: 7
unAPI

Worm : the first digital world war / by Bowden, Mark,1951-(CARDINAL)343505;
Includes bibliographical references.Zero -- MS08-067 -- Remote thread injection -- An ocean of suckers -- The X-men -- Digital detectives -- A note from the trenches -- Another huge win -- Mr. Joffe goes to Washington -- Cybarmageddon -- April fools.Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within weeks. Once the worm infiltrated one system it was able to link that system with others to form a single network under illicit outside control, a situation known as a "botnet," soon capable of overpowering any of the vital computer networks that today control banking, telephone service, energy flow, air traffic, health-care information, even the Internet itself. This book reports on the battle between those determined to exploit the Internet and those committed to protect it.--From publisher description.
Subjects: Computer crimes.; Computer viruses.; Cyberterrorism.;
Available copies: 9 / Total copies: 9
unAPI

Computer crime and computer security : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. by United States.Congress.House.Committee on the Judiciary.Subcommittee on Crime.(CARDINAL)138790;
Includes bibliographical references.
Subjects: Computer crimes; Computer security;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

From exposed to secure : the cost of cybersecurity and compliance inaction and the best way to keep you company safe.
The cybersecurity trap : why cybersecurity and cyber compliance are not the same -- Why small businesses are a cubercriminal's #1 target -- What are the biggest cyberthreats that could take your business down? -- Why cybersecurity is not one-and-down -- How to take the confusion out of compliance -- The perceptions about compliance that could put your business in danger -- Stop overcomplicating compliance by starting with the basics -- How not taking compliance as a culture seriously can destroy your company -- Your workforce is your biggest cybersercurity risk : here's eight best practices you need to minimize the risk -- Why employee education is your first line of defense -- How to inspire enthusiastic cybersecurity compliance from every employee -- Why compliance as a culture must be taken seriously from the top down -- Why it's a dangerous mistake to dump the entire burden of compliance on your internal IT department -- Why you have no choice but to be honest about your cyber hygiene -- Why cybersecurity won't save you if you're not compliant -- The impact of noncompliance -- The cost of noncompliance is the value of your business and - bottom line - your revenues -- The government doesn't care that you didn't know : how to protect yourself from paying fines and going to jail if you get hacked -- How much compliance is right for you? -- How to ensure you have exactly the right compliance strategy without overspending - what you don't know really can hurt you -- The secret to mitigating your risk -- The ten strategies you must have in place before insurers will even consider writing a cyber policy -- Critical steps to take if you've been hacked -- Understanding CMMC compliance : what you need to know -- Why the answers to these sixteen questions can help you select the right IT provider -- How an IT services provider keeps her own kids safe online."Cybercrime has developed into a billion-dollar industry. And as long as it's profitable to be a hacker or a scammer, these criminals aren't going away. Featuring top cybersecurity and compliance professionals from around the world, From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your resources to eliminate exposure and minimize risk. These experts share their decades of experience in utilizing data protection regulations and complete security measures to protect your company from fines, lawsuits, loss of revenue, operation disruption or destruction, intellectual property theft, and reputational damage. ..."--
Subjects: Computer security.; Cyberterrorism.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

The secret to cybersecurity : a simple plan to protect your family and business from cybercrime / by Augenbaum, Scott E.,author.;
Includes bibliographical references (pages 187-192).Cybercrimes are a threat and as dangerous as an armed intruder-yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers. It's 2 a.m.-do you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphones-and their parents don't have a clue. Is that you? What about your online banking passwords, are they safe? Has your email account or bank/debit card ever been compromised? In 2018, there were data breaches at several major companies-If those companies have your credit or debit information, that affects you. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they're hard at ٢work٣ when even you're sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it's up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you'll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate-and learn how to avoid being the next cyber victim.
Subjects: Computer crimes; Computer security.;
Available copies: 2 / Total copies: 3
unAPI

Tom Clancy's net force : night moves / by Clancy, Tom,1947-2013.(CARDINAL)293728; Pieczenik, Steve R.(CARDINAL)342190;
Accelerated Reader AR
Subjects: Fiction.; Computer crimes;
Available copies: 3 / Total copies: 3
unAPI

Tom Clancy's net force : hidden agendas / by Clancy, Tom,1947-2013.(CARDINAL)293728; Pieczenik, Steve R.(CARDINAL)342190;
860LAccelerated Reader AR
Subjects: Spy fiction.; Political fiction.; Science fiction.; Detective and mystery fiction.; Computer crimes;
Available copies: 2 / Total copies: 2
unAPI

Tom Clancy's Net force. by Perry, Steve.(CARDINAL)741442; Clancy, Tom,1947-2013.(CARDINAL)293728; Segriff, Larry.(CARDINAL)386077; Pieczenik, Steve R.(CARDINAL)342190;
Accelerated Reader AR
Subjects: Spy fiction.; Political fiction.; Novels.; Computer crimes;
Available copies: 1 / Total copies: 1
unAPI

Tom Clancy's Net force. by Clancy, Tom,1947-2013,author.(CARDINAL)293728; Perry, Steve,author.(CARDINAL)741442; Pieczenik, Steve R.,creator.(CARDINAL)342190; Segriff, Larry,author.(CARDINAL)386077; Copyright Paperback Collection (Library of Congress)(CARDINAL)376993;
Accelerated Reader AR
Subjects: Novels.; Political fiction.; Spy fiction.; Computer crimes;
Available copies: 2 / Total copies: 4
unAPI