Results 71 to 80 of 693 | « previous | next »
- Avoiding online hoaxes / by Shea, Therese.(CARDINAL)463688;
Includes bibliographical references (page 31) and index.Hoaxes and spam -- E-mail filters -- Many kinds, many places -- Why do people create hoaxes? -- Spotting a hoax -- Phishing -- Spiders on the Web -- You can fight hoaxes!Briefly describes the many kinds and many places of e-hoaxes, explains how to spot a hoax, etc.Accelerated Reader AR
- Subjects: Computer fraud; Computer crimes;
- Available copies: 1 / Total copies: 1
-
unAPI
- How cybersecurity really works : a hands-on guide for total beginners / by Grubb, Sam(Cyber security consultant),author.;
An Introduction to Cybersecurity -- How Black Hats Use the Internet -- How Black Hats Use Phishing to Trick You -- How Black Hats Use Malware to Infect Your Computer -- How Black Hats Access Your Accounts -- How Black Hats Tap Your Wires -- How Black Hats Attack the Cloud -- How Black Hats Pirate Your Wireless Internet -- How Black Hats Break Encryption -- How to Stop Black Hats."An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
- Subjects: Handbooks and manuals.; Instructional and educational works.; Computer security.; Computer crimes; Computer networks;
- Available copies: 1 / Total copies: 6
-
unAPI
- The Enigma Broker / by Breakfield, Charles V.(CARDINAL)702397;
-
- Subjects: Fiction.; Computer crimes; Computer crimes; Technology;
- Available copies: 1 / Total copies: 1
-
unAPI
- Spies, lies, and cybercrime : cybersecurity tactics to outsmart hackers and disarm scammers / by O'Neill, Eric,1973-author.https://id.oclc.org/worldcat/entity/E39PBJd8f9W8D3D6pcj8Ck6Yfqhttps://isni.org/isni/0000000501733553(CARDINAL)804789;
Includes bibliographical references.Part I: Think like a spy. The house is burning down -- The cloak-and-dagger game -- Deception: How an email launched a war -- Impersonation: How to skip school -- Impersonation: Deepfakes -- Infiltration: The Trojan Horse -- Infiltration: Indomitable weeds -- Confidence: "I want to believe" -- Confidence: Question everything -- Exploitation: Spelunking into a nightmare -- Exploitation: No blank pages -- Destruction: Inside the fishbowl -- Destruction: Up at night -- Part II: Act like a spy hunter. Intro to PAID -- Prepare -- Assess -- Investigate -- Decide -- Congratulations, spy hunter -- The spy hunter tool kit."Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually. It's possible to fight back, but you'll need more than a strong password. Drawing on his years as an FBI spy hunter and national security strategist, Eric O'Neill casts light on these malicious actors' tactics for stealing personal data and exploiting victims. Armed with this knowledge, O'Neill shares his method--called PAID--that you can use to defend yourself and stop attackers in their tracks: Prepare: Pinpoint your most critical data, identify where it resides and who can access it, and build your defenses around it. Assess: Continuously reassess your security and apply counterintelligence tactics to identify scams and cyberattacks. Investigate: Stay educated and hunt the threat before the threat hunts you. Decide: Using your new aptitude, make smart, rapid decisions under pressure. Written by a top expert in the field, Spies, Lies, and Cybercrime offers easy-to-follow steps for staving off cyberattacks, securing your data, and keeping private information safe in an increasingly digital and dizzying world"--
- Subjects: Computer crimes; Computer security.;
- Available copies: 0 / Total copies: 2
-
unAPI
- Everything you need to know about social media : (without having to call a kid) / by Van Susteren, Greta,1954-author.(CARDINAL)349108;
A step-by-step guide intended to help readers understand the major social platforms, including Facebook, Twitter, LinkedIn, Instagram, and Snapchat, addresses important moral and behavioral issues.Getting started and getting better -- Facebook -- Twitter -- Linkedin -- Instagram -- Snapchat -- Personal broadcasting and communicating Facebook live, periscope, youtube, and blogs -- Social media, privacy, and you -- Parting posts.
- Subjects: Social media.; Privacy.; Computer crimes.; Social media.;
- Available copies: 21 / Total copies: 23
-
unAPI
- Surviving a cyberstalker : how to prevent and survive cyberabuse and stalking/ by Moore, Alexis.;
This book is written to help you protect yourself from cyberabuse and stalking and to empower you to fight back. It is vital to regaining control over your life in case you and a cyberpredator or stalker ever cross paths. Many victims find little or no help from any law enforcement agency or victim service providers, even though there are stalking and cyberabuse laws. Regulations fail to evolve quickly enough to address the creativity and spontaneity of today's predators.
- Subjects: Computer crimes.; Cyberstalking.; Stalking.; Harassment.; Harassment.;
- Available copies: 2 / Total copies: 2
-
unAPI
- Cybercrime / by Stefoff, Rebecca,1951-;
Includes bibliographical references and index.Introduction : what is forensics? -- The world of high-tech crime -- Cybercrimes and cybercases -- Computer forensics.
- Subjects: Computer crimes.; Forensic sciences.;
- Available copies: 2 / Total copies: 2
-
unAPI
- Cybercrime : data trails do tell tales / by Latta, Sara L.(CARDINAL)644653;
Includes bibliographical references (page 101) and index.Cybercrime doesn't pay -- Phone phreaks and hackers: the history of cybercrime -- Viruses, bots, and zombies-oh my! -- You've got spam! -- Arrgh, matey! internet piracy is no joke -- Cyber cops -- So you want to be a digital detective?."Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher.Introduces different types of computer crimes, presents a history and real-life examples for each crime, and describes the individuals tasked with protecting businesses, governments, and the public from criminals.
- Subjects: Computer crimes;
- Available copies: 1 / Total copies: 1
-
unAPI
- Ransomware : defending against digital extortion / by Liska, Allan,author.; Gallo, Timothy,author.;
Includes bibliographical references and index.The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. Youll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid and the pros and cons of paying Use methods to protect your organizations workstations and servers
- Subjects: Computer security.; Computer crimes; Internet;
- Available copies: 1 / Total copies: 1
-
unAPI
- Bad memory / by Franklet, Duane.(CARDINAL)637919;
A disgruntled worker inserts a bug into the computer system manufactured by his company and only he knows how to get rid of it. If the company wants him to help, however, it will have to pay a million dollars. The company assigns computer whiz Barry Shepherd to find the man or the bug, or both.
- Subjects: Action and adventure fiction.; Hackers; Computer crimes; Extortion;
- Available copies: 3 / Total copies: 3
-
unAPI
Results 71 to 80 of 693 | « previous | next »