Search:

Computer security / by Time-Life Books.(CARDINAL)137698;
Bibliography: pages 122-124.
Subjects: Computer security.;
Available copies: 1 / Total copies: 1
unAPI

Computer security / by Hamilton, Peter,1917-2002.(CARDINAL)157777;
Bibliography: pages 113-116.
Subjects: Electronic data processing departments;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Computer security / by Hsiao, David K.,1933-(CARDINAL)143203; Kerr, Douglas S.(CARDINAL)140085; Madnick, Stuart E.(CARDINAL)140113;
Includes bibliographies and indexes.
Subjects: Computers; Electronic data processing departments;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

Inside the security mind ; making the tough decisions / by Day, Kevin,1975-(CARDINAL)865505;
Subjects: Computer security.;
Available copies: 1 / Total copies: 1
unAPI

Cybersecurity for everyone : a human-centered approach to protecting yourself and your community / by Olieslaeger, Cathy,author.;
Chapter 1: Start with Why -- Chapter 2: Journey into Cybersecurity -- Chapter 3: Common misconceptions -- Chapter 4: We're losing -- Chapter 5: How does Cybercrime affecct you and your family -- Chapter 6: How to keep you and your family safe -- Chapter 7: Plan of action for Educators -- Chapter 8: Plan of action for Students -- Chapter 9: Plan of action for hiring Managers and HR leaders -- Chapter 10: Plan of action for Business Leaders.In a world where cyber threats are growing exponentially in number and complexity, its time to ask the tough question: What are we doing wrong? Weve been tackling cybersecurity the same way for years, yet the bad actors continue to stay ahead. Financial losses mount, and the talent gap in the cybersecurity industry remains a persistent challenge. Its time to break the cycle. This book takes a bold, fresh look at cybersecurity by shifting the focus away from the technical jargon and putting the spotlight on the people who matter mostyou. Whether youre a student, a professional, a parent, or a business leader, this book is designed to help you understand cybersecuritys role in everyday life and how you can make a difference. From the classroom to the boardroom, theres a shared responsibility in keeping our digital world safe. Unlike traditional cybersecurity books filled with complex terminology and tech-heavy concepts, this book humanizes the topic. It provides practical, real-world solutions for protecting yourself, your family, your workplace, and your community. Youll learn not just the how but also the whywhy cybersecurity matters and why it's a people-first issue that concerns all of us, regardless of our background or profession. Whether youre just starting your cybersecurity journey or you're looking to build a security-first culture within your organization, this book equips you with the knowledge and confidence to make an impact. With a focus on democratizing cybersecurity knowledge, this guide is your call to action, offering accessible insights to foster a more secure digital future for everyone. What You Will Learn Protect yourself and the people you care about Journey into cybersecurity without having to break anything Educate students about keeping safe in the digital world Build bridges between the educational and professional worlds Establish a cybersecurity cultrure as a bsiness leader .
Subjects: Computer security.;
Available copies: 2 / Total copies: 2
unAPI

Security simplified computer internet protection for beginners / by Khan, Arshad.(CARDINAL)654868;
Includes bibliographical references and index.
Subjects: Computer security.;
Available copies: 1 / Total copies: 2
unAPI

Information warfare : chaos on the electronic superhighway / by Schwartau, Winn.(CARDINAL)208326;
Includes bibliographical references and index.The Econo-politics of information warfare -- Computers everywhere and the global network -- Binary schizophrenia -- On the nature of insidious -- Influenza, malicious software, and OOPS! -- Sniffers and the switch -- The World of Mr. va Eck -- Cryptography ...As the National Information Infrastructure grows and evolves into everyman's electronic superhighway, are we opening the doors to an electronic cold war? Or are we on the edge of a brave new precipice overlooking the dawn of the information revolution? With over 125,000,000 computers inextricably tying our economy together through complex land and satellite-based communications systems, a major portion of our domestic 6 trillion dollar economy depends on their consistent and reliable operation. In a serious and inviting manner, Information Warfare: Chaos on the Electronic Superhighway examines the awesome potential for industrial and international espionage. Through sabotage, theft, data manipulation, and other means, our economy could be crippled beyond anything in recent history. Currently within the banking community it is common practice for banks to use creative accounting to hide millions of dollars lost every year through Information Warfare. In Information Warfare the "digital persona" plays the role of victim and perpetrator. The wrong hands could extract the most personal information about the "digital you," not the least of which could be medical, financial, business, legal, and criminal documentation. An individual could alter his/her own records to eradicate nefarious histories. Or an individual could alter anyone's electronic documentation for any reason. Information Warfare outlines almost every kind of informational disaster imaginable leaving the reader to think there may be no way out of the quagmire that is the new information age. However, author Winn Schwartau details current trends in Information Warfare and inspires the dialogue necessary to establish a National Information Policy, a constitution for Cyberspace and an Electronic Bill of Rights.
Subjects: Computer security.; Computer crimes.;
Available copies: 2 / Total copies: 2
On-line resources: Suggest title for digitization;
unAPI

Your safety and privacy online : the CIA and NSA / by Bjarnason, Siggi,author.;
About this book -- Introduction -- General principles -- Authentication -- NSA, SSL, TLS, VPN, and TLA -- Malware threats -- Scams, cons, and other dangers -- In closing -- AppendixThe purpose of this book is to provide an average computer user with the knowledge that will help them stay safe while online, as well as help them make privacy choices that work for them. My goal is to explain online threats in terms that don't require a technical background to understand. All techno-speak will be limited, and where it cannot be avoided, I will first be explained in common non-computer terms. This book should be accessible to anyone with enough computer knowledge to use Facebook, Twitter, and other social media, do some online shopping, use google to search for cat videos and pay your bills online, all the important stuff. If you are comfortable doing those things, you are in the core demographic for this book. While this book was written with a US consumer in mind, this book will be equally applicable all over the world. There may be an occasional inside joke that folks outside the USA won't understand, but that shouldn't detract anything from the book. What is different about this book is that I'm targeting non-technical folks and I'm explaining the issues and the threats without resulting to scare tactics or threats which seem so prevalent in today's security training. Something called FUD, Fear Uncertainty and Doubt is very prevalent in today information security space. I'm avoiding all FUD in this book.
Subjects: Computer security.;
Available copies: 1 / Total copies: 1
unAPI

Digital fortress / by Brown, Dan,1964-(CARDINAL)346830;
Accelerated Reader AR
Subjects: Action and adventure fiction.; Computer security;
Available copies: 3 / Total copies: 3
unAPI

Patrolling cyberspace : lessons learned from a lifetime in data security / by Schmidt, Howard A.(CARDINAL)552193;
Subjects: Computer crimes.; Computer security.;
Available copies: 0 / Total copies: 1
unAPI