Results 1 to 10 of 26 | next »
- Ransomware protection playbook / by Grimes, Roger A.,Author(DLC)n 2001000539;
Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: *Quickly detect an attack, limit the damage, and decide whether to pay the ransom *Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage *Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.
- Subjects: Computer security.; Computer crimes; Malware (Computer software);
- Available copies: 1 / Total copies: 1
-
unAPI
- The ransomware hunting team : a band of misfits' improbable crusade to save the world from cybercrime / by Dudley, Renee,1985-author.(CARDINAL)863373; Golden, Daniel,1957-author.(CARDINAL)355176;
Includes bibliographical references (pages 323-342) and index.Introduction: "Are you indeed a Barbarian?" -- The man who invented ransomware -- The superhero of Normal, Illinois -- The hunters gather -- The funny war -- The price of obsession -- StoppingSTOP -- Ryuk reigns -- The FBI's dilemma -- The G-man and the dolphin -- Shaking down a city -- The extortion economy -- Lawrence's truce -- Pipeline to tomorrow."A real-life technological thriller about a band of eccentric misfits taking on the biggest cybersecurity threats of our time. What Michael Lewis did for baseball in Moneyball, Dudley and Golden do brilliantly for the world of ransomware and hackers. Cinematic, big in scope, and meticulously reported, this book is impossible to put down. --Doug Stanton, New York Times bestselling author of "In Harm's Way and Horse Soldiers". Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar with the team's sworn enemy: ransomware. Again and again, an unlikely band of misfits, mostly self-taught and often struggling to make ends meet, have outwitted the underworld of hackers who lock computer networks and demand huge payments in return for the keys. The Ransomware Hunting Team traces the adventures of these unassuming heroes and how they have used their skills to save millions of ransomware victims from paying billions of dollars to criminals. Working tirelessly from bedrooms and back offices, and refusing payment, they've rescued those whom the often hapless FBI has been unwilling or unable to help. Foremost among them is Michael Gillespie, a cancer survivor and cat lover who got his start cracking ransomware while working at a Nerds on Call store in the town of Normal, Illinois. Other teammates include the brilliant, reclusive Fabian Wosar, a high school dropout from Germany who enjoys bantering with the attackers he foils, and his protégé, the British computer science prodigy Sarah White. Together, they have established themselves as the most effective force against an escalating global threat. This book follows them as they put their health, personal relationships, and financial security on the line to navigate the technological and moral challenges of combating digital hostage taking. Urgent, uplifting, and entertaining, Renee Dudley and Daniel Golden's The Ransomware Hunting Team is a real-life technological thriller that illuminates a dangerous new era of cybercrime."--
- Subjects: Computer crimes; Computer security.; Malware (Computer software);
- Available copies: 19 / Total copies: 20
-
unAPI
- Zero days [videorecording] / by Gibney, Alex,film director,film producer,screenwriter.(CARDINAL)282407; Shmuger, Marc,film producer.; Sanger, David E.,interviewee (expression)(CARDINAL)356232; Kiyaei, Emad,interviewee (expression); Chien, Eric,interviewee (expression); Grieve, Andy,1977-editor of moving image work.; Rossi, Antonio(Antonio M.),director of photography.; Wiley, Brett,director of photography.; Bates, Will,1977-composer (expression); Magnolia Pictures (Firm),presenter.(CARDINAL)300209; Participant Media,presenter.(CARDINAL)300208; Showtime Documentary Films,presenter.(CARDINAL)792098; Global Produce (Firm),production company.; Jigsaw Productions,production company.; Magnolia Home Entertainment (Firm),publisher.(CARDINAL)300206;
DVD, NTSC, region 1; widescreen presentation (1.78:1 aspect ratio); 5.1 Dolby Digital.Featuring David Sanger, Emad Kiyaei, Eric Chien.Editor, Andy Grieve ; original music, Will Bates ; cinematography, Antonio Rossi, Brett Wiley.MPAA rating: PG-13 (parents strongly cautioned; some material may be inappropriate for children under 13) for some strong language.A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex Gibney.Evil and good -- Deep analysis -- Magic numbers -- Isotope 236 -- Physical tests -- Cyber warfare unit -- New territory -- Fooling the system -- Pandora's box -- Doctrine -- The most vulnerable.
- Subjects: Documentary films.; Nonfiction films.; Feature films.; Feature films; Video recordings for the hearing impaired.; Computer crimes.; Computer security.; Malware (Computer software); Hackers.;
- Available copies: 6 / Total copies: 6
-
unAPI
- Hacking exposed : malware and rootkits : security secrets & solutions / by Elisan, Christopher C.,author.(CARDINAL)606072; Davis, Michael,1982-author.(CARDINAL)499640; Bodmer, Sean,author.(CARDINAL)564889; LeMasters, Aaron,author.(CARDINAL)563804;
Malware -- Rootkits -- Prevention technologies -- Appendix; system integrity analysis: building your own rootkit detector.Fully updated to cover the most current tools, techniques, and exploits, this new edition presents the latest Hacking Exposed strategies for defending against the world's number one attack type: malware.
- Subjects: Computer security.; Computer networks; Malware (Computer software); Rootkits (Computer software);
- Available copies: 1 / Total copies: 3
-
unAPI
- Origami man / by FitzSimmons, Matthew,author.(CARDINAL)630926;
-
- Subjects: Action and adventure fiction.; Thrillers (Fiction); Novels.; Marines; Hackers; Terrorists; Computer crimes; Malware (Computer software);
- Available copies: 2 / Total copies: 2
-
unAPI
- Zed : a novel / by Kavenna, Joanna,author.(CARDINAL)548261;
-
- Subjects: Fiction.; Adultery; Chief executive officers; Hackers; Malware (Computer software);
- Available copies: 8 / Total copies: 9
-
unAPI
- Last chance to save the world / by Revis, Beth,author.(CARDINAL)339466;
"The explosive, satisfying conclusion to the Chaotic Orbits novella trilogy sees Ada and Rian breaking into a high-security facility to give Earth a fighting chance at survival"--After a few weeks trapped on board a spaceship with Ada (and, oh look, there's only one bed), Rian has to admit that maybe Ada's rebels have a point. The nanobots poised to be unleashed on Earth are infected with malware that will ultimately leave the residents of Earth in a worse position than they're in now. But is it too late? Ada and Rian arrive on Earth with little time to spare. Together, they have to break into a high-security facility and infect the nanobots with a counter-virus before they're released in order to give Earth a fighting chance. And if Ada happens to notice some great tech laying around in this high-security facility she shouldn't have access to and then happens to steal a bunch of it when Rian's not looking? Well, he knew who she was before he teamed up with her. And if he wants it back, he's going to have to catch her first.
- Subjects: Science fiction.; Romance fiction.; Novellas.; Malware (Computer software); Robots; Space ships; Man-woman relationships; Thieves;
- Available copies: 11 / Total copies: 13
-
unAPI
- Blackhat [videorecording] / by Mann, Michael,1943-film director,film producer.(CARDINAL)810165; Foehl, Morgan Davis,screenwriter.; Tull, Thomas,film producer.(CARDINAL)787511; Jashni, Jon,film producer.(CARDINAL)786484; Hemsworth, Chris,actor.(CARDINAL)357186; Davis, Viola,1965-actor.(CARDINAL)556332; Tang, Wei,1979-actor.; Coster, Ritchie,actor.; McCallany, Holt,actor.(CARDINAL)848859; Wageningen, Yorick van,1964-actor.; Wang, Lihong,1976-actor.; Mapother, William,1965-actor.; Ortiz, John,actor.(CARDINAL)845892; Forward Pass Productions,production company.(CARDINAL)786151; Legendary Pictures,presenter,production company.(CARDINAL)342970; Universal Pictures (Firm),presenter.(CARDINAL)318695; Universal Studios Home Entertainment (Firm),publisher.(CARDINAL)344011;
Music, Harry Gregson-Williams, Atticus Ross ; editors, Joe Walker, Stephen Rivkin, Jeremiah O'Driscoll, Mako Kamitsuna ; director of photography, Stuart Dryburgh.Chris Hemsworth, Viola Davis, Wei Tang, Ritchie Coster, Holt McCallany, Yorick van Wageningen, Wang Leehom, William Mapother, John Ortiz.A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta.MPAA rating: R; for violence and some language.DVD ; anamorphic widescreen (2.40:1) presentation ; Dolby digital 5.1 surround (English, Spanish and French) and 2.0 stereo. surround (DVS).
- Subjects: Action and adventure films.; Crime films.; Thrillers (Motion pictures); Feature films.; Fiction films.; Video recordings for the hearing impaired.; Video recordings for people with visual disabilities.; Ex-convicts; Computer crimes; Malware (Computer software); Hackers; Terrorism;
- Available copies: 10 / Total copies: 12
-
unAPI
- Blackhat [videorecording] by Davis, Viola,actor.; Foehl, Morgan Davis,screenwriter.; Hemsworth, Chris,actor.(CARDINAL)357186; Mann, Michael,1943-film director.(CARDINAL)810165; Wei, Tang,actor.(CARDINAL)767595; Forward Pass Productions,production company.(CARDINAL)786151; Legendary Pictures,presenter,production company.(CARDINAL)342970; Universal Pictures (Firm),presenter.(CARDINAL)318695; Universal Studios Home Entertainment (Firm),publisher.(CARDINAL)344011;
Director of photography, Stuart Dryburg ; film editor,Joe Walker ; music, Harry Gregson-Williams, Atticus Ross.Chris Hemsworth, Tang Wei, Viola Davis.A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta.CHV rating: PG; for violence.Rating: R; for violence and some language.Blu-ray, 1080p High-Definition; DTS-HD Master Audio 5.1, DVS 2.0, DTS Digital surround 5.1; requires Blu-ray player.
- Subjects: Action and adventure films.; Feature films.; Video recordings for people with visual disabilities.; Video recordings for the hearing impaired.; Computer crimes; Ex-convicts; Hackers; Malware (Computer software); Terrorism;
- Available copies: 1 / Total copies: 2
-
unAPI
- Collateral damage [large print] / by Jance, Judith A.,author.(CARDINAL)345914;
"With her husband and founding partner of High Noon Enterprises, B. Simpson, preoccupied by an upcoming trip to London, Ali Reynolds, is ready for a break. But when Stu Ramey barges into her home with grave news about a suspicious accident involving the car in which B. was riding, things take a turn for the worse. At the hospital, B. insists that Ali take his place at a conference in London, as troubles brimming around High Noon come to light. In a race against time, Ali must assemble the pieces of a puzzle, woven with vendettas she never could have imagined, all before she and the people she loves become collateral damage."--
- Subjects: Large print books.; Detective and mystery fiction.; Thrillers (Fiction); Fiction.; Reynolds, Ali (Fictitious character); Women private investigators; Revenge; Spouses; Ex-police officers; Malware (Computer software); Traffic accidents;
- Available copies: 62 / Total copies: 68
-
unAPI
Results 1 to 10 of 26 | next »