Results 21 to 30 of 1,050 | « previous | next »
- Cyber smart : five habits to protect your family, money, and identity from cyber criminals / by McDonough, Bart,author.;
Setting the stage -- Overview of cyber risks -- Attackers -- Attack targets and goals -- Attack methods -- Attack chain -- Attack vectors -- Brilliance in the basics -- Mistakes -- Incident response -- Specific recommendations -- Protecting your identity -- Protecting your children -- Protecting your money -- Protecting your email -- Protecting your files -- Protecting your social media -- Protecting your website access and passwords -- Protecting your computer -- Protecting your mobile devices -- Protecting your home wi-fi -- Protecting your IoT devices -- Protecting your information when traveling."In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from: identity theft, compromising your children, lost money, and lost access to email and social media accounts."
- Subjects: Computer networks; Computer security.;
- Available copies: 3 / Total copies: 3
-
unAPI
- The hundredth window : protecting your privacy and security in the age of the Internet / by Jennings, Charles,1948-(CARDINAL)719578; Fena, Lori,1961-(CARDINAL)701160;
-
- Subjects: Computer security.; Internet;
- Available copies: 1 / Total copies: 1
-
unAPI
- Crimedotcom : from viruses to vote rigging, how hacking went global / by White, Geoff,author.;
Includes bibliographical references (pages 313-334) and index.From Anonymous to the Dark Web, a dizzying account of hacking--past, present, and future. "Brilliantly researched and written."-Jon Snow, Channel 4 News. "A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. . . . Lively, insightful, and, often, alarming."-Ewen MacAskill, Guardian. On May 4, 2000, an email that read "kindly check the attached LOVELETTER" was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States' hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it.
- Subjects: Computer crimes.; Computer security.; Computer crimes;
- Available copies: 1 / Total copies: 1
-
unAPI
- Well aware : master the nine cybersecurity habits to protect your future / by Finney, George,author.;
Includes bibliographical references and index.Foreword / by Valmiki Mukherjee -- Introduction: The nine cybersecurity habits. Literacy ; Skepticism ; Vigilance ; Secrecy ; Culture ; Diligence ; Community ; Mirroring ; Deception -- Conclusion.Key Strategies to Safeguard Your FutureWell Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it's a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered--literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception--drawn from knowledge the author has acquired during two decades of experience in cybersecurity. By implementing these habits and changing our behaviors, we can combat most security problems.This book examines our security challenges using lessons learned from psychology, neuroscience, history, and economics. Business leaders will learn to harness effective cybersecurity techniques in their businesses as well as their everyday lives.
- Subjects: Computer security.; Cyber intelligence (Computer security); Internal security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- The secret to cybersecurity : a simple plan to protect your family and business from cybercrime / by Augenbaum, Scott E.,author.;
Includes bibliographical references (pages 187-192).Cybercrimes are a threat and as dangerous as an armed intruder-yet millions of Americans are complacent or simply uninformed of how to protect themselves. The Secret to Cybersecurity closes that knowledge gap by using real-life examples to educate readers. It's 2 a.m.-do you know who your child is online with? According to author Scott Augenbaum, between 80 to 90 percent of students say they do whatever they want on their smartphones-and their parents don't have a clue. Is that you? What about your online banking passwords, are they safe? Has your email account or bank/debit card ever been compromised? In 2018, there were data breaches at several major companies-If those companies have your credit or debit information, that affects you. There are bad people in the world, and they are on the internet. They want to hurt you. They are based all over the world, so they're hard at ٢work٣ when even you're sleeping. They use automated programs to probe for weaknesses in your internet security programs. And they never stop. Cybercrime is on the increase internationally, and it's up to you to protect yourself. But how? The Secret to Cybersecurity is the simple and straightforward plan to keep you, your family, and your business safe. Written by Scott Augenbaum, a 29-year veteran of the FBI who specialized in cybercrimes, it uses real-life examples to educate and inform readers, explaining who/why/how so you'll have a specific takeaway to put into action for your family. Learn about the scams, methods, and ways that cyber criminals operate-and learn how to avoid being the next cyber victim.
- Subjects: Computer crimes; Computer security.;
- Available copies: 2 / Total copies: 3
-
unAPI
- Build your computer security skills / by Furgang, Adam,author.(CARDINAL)488293; Harris, Christopher,1977-author.(CARDINAL)292051; Gennari, Joel,illustrator.(CARDINAL)792852;
Includes bibliographical references and index.Can you break the code? -- Strong password algorithm -- Teach your grandma to be safe! -- Alphanumeric password memory game -- Binary message decoder -- Username & password two-step verification -- Phishing for information -- Word search encrypted password key -- Fingerprint maze mobile phone access -- Mnemonic memory password phrase -- Security scavenger hunt -- Web safety review crossword puzzle -- Answer key.Grades: 5 to 8.
- Subjects: Computer security; Computer security; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Viruses and spam / by Day-MacLeod, Deirdre,author.(CARDINAL)669555;
Includes bibliographical references (pages 42-45) and index.Accelerated Reader AR
- Subjects: Computer crimes.; Computer security.; Cyberterrorism.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Cyber crisis : protecting your business from real threats in the virtual world / by Cole, Eric,author.(CARDINAL)222723;
Introduction: The current reality -- We are all targets -- We live in cyberspace -- The hackers are here -- Mobile weaknesses -- Your life, hanging in the Cloud -- They're in your business -- National infrastructure attack -- Cyberspace: a place with no borders -- Surviving the cyber crisis -- Conclusion: Ten lessons to remember."From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection"--Today, we live our lives and conduct our business online. Our data is shuttled over public Wi-Fi and company networks. We rely on passwords and encryption and private servers, IT departments and best practices. Cybersecurity attacks have increased exponentially, but because they're stealthy and often invisible, many underplay, ignore, or simply don't realize the danger. Cole gives readers a clear picture of the information war, and offers practical, actionable advice that even those with little technical background can implement. -- adapted from jacket
- Subjects: Cyberterrorism.; Computer crimes.; Computer security.;
- Available copies: 7 / Total copies: 7
-
unAPI
-
From exposed to secure : the cost of cybersecurity and compliance inaction and the best way to keep you company safe.
The cybersecurity trap : why cybersecurity and cyber compliance are not the same -- Why small businesses are a cubercriminal's #1 target -- What are the biggest cyberthreats that could take your business down? -- Why cybersecurity is not one-and-down -- How to take the confusion out of compliance -- The perceptions about compliance that could put your business in danger -- Stop overcomplicating compliance by starting with the basics -- How not taking compliance as a culture seriously can destroy your company -- Your workforce is your biggest cybersercurity risk : here's eight best practices you need to minimize the risk -- Why employee education is your first line of defense -- How to inspire enthusiastic cybersecurity compliance from every employee -- Why compliance as a culture must be taken seriously from the top down -- Why it's a dangerous mistake to dump the entire burden of compliance on your internal IT department -- Why you have no choice but to be honest about your cyber hygiene -- Why cybersecurity won't save you if you're not compliant -- The impact of noncompliance -- The cost of noncompliance is the value of your business and - bottom line - your revenues -- The government doesn't care that you didn't know : how to protect yourself from paying fines and going to jail if you get hacked -- How much compliance is right for you? -- How to ensure you have exactly the right compliance strategy without overspending - what you don't know really can hurt you -- The secret to mitigating your risk -- The ten strategies you must have in place before insurers will even consider writing a cyber policy -- Critical steps to take if you've been hacked -- Understanding CMMC compliance : what you need to know -- Why the answers to these sixteen questions can help you select the right IT provider -- How an IT services provider keeps her own kids safe online."Cybercrime has developed into a billion-dollar industry. And as long as it's profitable to be a hacker or a scammer, these criminals aren't going away. Featuring top cybersecurity and compliance professionals from around the world, From Exposed To Secure reveals the everyday threats that are putting your company in danger and where to focus your resources to eliminate exposure and minimize risk. These experts share their decades of experience in utilizing data protection regulations and complete security measures to protect your company from fines, lawsuits, loss of revenue, operation disruption or destruction, intellectual property theft, and reputational damage. ..."--
- Subjects: Computer security.; Cyberterrorism.; Computer crimes.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Digital crime : policing the Cybernation / by Barrett, Neil.;
-
- Subjects: Computer crimes.; Computer crimes; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
Results 21 to 30 of 1,050 | « previous | next »