Results 11 to 20 of 1,050 | « previous | next »
- Network security : a hacker's perspective / by Fadia, Ankit,1985-(CARDINAL)867025;
-
- Subjects: Computer security.; Hackers.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Crypto : how the code rebels beat the government- saving privacy in the digital age / by Levy, Steven.(CARDINAL)728807;
Includes bibliographical references (pages 331-344) and index.
- Subjects: Computer security.; Cryptography.;
- Available copies: 2 / Total copies: 2
-
unAPI
- The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers / by Mitnick, Kevin,1963-2023.(CARDINAL)528699; Simon, William L.,1930-(CARDINAL)750286;
Includes bibliographical references and index.
- Subjects: Computer security.; Hackers.;
- Available copies: 3 / Total copies: 3
-
unAPI
- Linux firewalls / by Ziegler, Robert L.(Robert Loren),1954-(CARDINAL)223532;
-
- Subjects: Linux.; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Cybersecurity / by Steinberg, Joseph(Cybersecurity expert),author.;
Introduction -- Part 1: Getting started with cybersecurity. What exactly is cybersecurity? ; Getting to know common cyberattacks ; The bad guys you must defend against and how they plan to attack you -- Part 2: Improving your own personal security. Evaluating your current cybersecurity posture ; Enhancing physical security ; Cybersecurity considerations when working from home -- Part 3: Protecting yourself from yourself. Securing your accounts ; Passwords ; Preventing social engineering attacks -- Part 4: Cybersecurity for businesses, organizations, and government. Securing your small business ; Cybersecurity and big businesses -- Part 5: Handling a security incident (this is a when, not an if). Identifying a security breach ; Recovering from a security breach -- Part 6: Backing up and recovery. Backing up ; Resetting your device ; Restoring from backups -- Part 7: Looking toward the future. Pursuing a cybersecurity career ; Meeting the onrush of Artificial Intelligence ; Emerging technologies bring new threats -- Part 8: The part of tens. Ten ways to improve your cybersecurity without spending a fortune ; Ten (or so) lessons from major cybersecurity breaches ; Ten ways to safely use public wi-fi.
- Subjects: Handbooks and manuals.; Computer security.; Computer networks;
- Available copies: 8 / Total copies: 13
-
unAPI
- Cybersecurity / by Steinberg, Joseph(Cybersecurity expert),author.;
What exactly is cybersecurity? -- getting to know common cyberattacks -- baed guys and accidental bad guys: the folks you must defend against -- evaluating your current cybersecurity posture -- enhancing physical security -- securing your accounts -- passwords -- preventing social engineering -- securing your small business -- cybersecurity and big businesses -- identifying a security breach -- recovering from a security breach -- backing up -- resetting your device -- resotring from backups -- pursuing a cybersecurity career -- emerging technologies bring new threats -- ten ways you can improve your cybersecurity without spending a fortuen -- ten lessons from major cybersecurity breaches -- ten ways to safely use public wi-fiProtect your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities that may make you a target of cyber-crime and helps you stay on top of your security game. Inside: - The who and what of cybersecurity threats - Basic cybersecurity concepts - What to do to be cyber-secure - What to do when an attack occurs - Emerging technologies and their impact on Cybersecurity - Cybersecurity Careers.
- Subjects: Computer security.; Computer networks;
- Available copies: 13 / Total copies: 18
-
unAPI
- Computer crime and computer security : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. by United States.Congress.House.Committee on the Judiciary.Subcommittee on Crime.(CARDINAL)138790;
Includes bibliographical references.
- Subjects: Computer crimes; Computer security;
- Available copies: 1 / Total copies: 1
- On-line resources: Suggest title for digitization;
-
unAPI
- Is it safe? : protecting your computer, your business, and yourself online / by Miller, Michael,1958-(CARDINAL)198072;
-
- Subjects: Computer networks; Computer security.;
- Available copies: 2 / Total copies: 2
-
unAPI
- Threat modeling : a practical guide for developing teams / by Tarandach, Izar,author.; Coles, Matthew J.,author.;
Includes bibliographical references and index.
- Subjects: Computer networks; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Hacker's challenge : test your incident response skills using 20 scenarios / by Schiffman, Mike.(CARDINAL)222921;
-
- Subjects: Computer networks; Computer security.;
- Available copies: 1 / Total copies: 2
-
unAPI
Results 11 to 20 of 1,050 | « previous | next »