Search:

Network security : a hacker's perspective / by Fadia, Ankit,1985-(CARDINAL)867025;
Subjects: Computer security.; Hackers.;

Crypto : how the code rebels beat the government- saving privacy in the digital age / by Levy, Steven.(CARDINAL)728807;
Includes bibliographical references (pages 331-344) and index.
Subjects: Computer security.; Cryptography.;

The art of intrusion : the real stories behind the exploits of hackers, intruders & deceivers / by Mitnick, Kevin,1963-2023.(CARDINAL)528699; Simon, William L.,1930-(CARDINAL)750286;
Includes bibliographical references and index.
Subjects: Computer security.; Hackers.;

Linux firewalls / by Ziegler, Robert L.(Robert Loren),1954-(CARDINAL)223532;
Subjects: Linux.; Computer security.;

Cybersecurity / by Steinberg, Joseph(Cybersecurity expert),author.;
Introduction -- Part 1: Getting started with cybersecurity. What exactly is cybersecurity? ; Getting to know common cyberattacks ; The bad guys you must defend against and how they plan to attack you -- Part 2: Improving your own personal security. Evaluating your current cybersecurity posture ; Enhancing physical security ; Cybersecurity considerations when working from home -- Part 3: Protecting yourself from yourself. Securing your accounts ; Passwords ; Preventing social engineering attacks -- Part 4: Cybersecurity for businesses, organizations, and government. Securing your small business ; Cybersecurity and big businesses -- Part 5: Handling a security incident (this is a when, not an if). Identifying a security breach ; Recovering from a security breach -- Part 6: Backing up and recovery. Backing up ; Resetting your device ; Restoring from backups -- Part 7: Looking toward the future. Pursuing a cybersecurity career ; Meeting the onrush of Artificial Intelligence ; Emerging technologies bring new threats -- Part 8: The part of tens. Ten ways to improve your cybersecurity without spending a fortune ; Ten (or so) lessons from major cybersecurity breaches ; Ten ways to safely use public wi-fi.
Subjects: Handbooks and manuals.; Computer security.; Computer networks;

Cybersecurity / by Steinberg, Joseph(Cybersecurity expert),author.;
What exactly is cybersecurity? -- getting to know common cyberattacks -- baed guys and accidental bad guys: the folks you must defend against -- evaluating your current cybersecurity posture -- enhancing physical security -- securing your accounts -- passwords -- preventing social engineering -- securing your small business -- cybersecurity and big businesses -- identifying a security breach -- recovering from a security breach -- backing up -- resetting your device -- resotring from backups -- pursuing a cybersecurity career -- emerging technologies bring new threats -- ten ways you can improve your cybersecurity without spending a fortuen -- ten lessons from major cybersecurity breaches -- ten ways to safely use public wi-fiProtect your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities that may make you a target of cyber-crime and helps you stay on top of your security game. Inside: - The who and what of cybersecurity threats - Basic cybersecurity concepts - What to do to be cyber-secure - What to do when an attack occurs - Emerging technologies and their impact on Cybersecurity - Cybersecurity Careers.
Subjects: Computer security.; Computer networks;

Computer crime and computer security : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. by United States.Congress.House.Committee on the Judiciary.Subcommittee on Crime.(CARDINAL)138790;
Includes bibliographical references.
Subjects: Computer crimes; Computer security;

Is it safe? : protecting your computer, your business, and yourself online / by Miller, Michael,1958-(CARDINAL)198072;
Subjects: Computer networks; Computer security.;

Threat modeling : a practical guide for developing teams / by Tarandach, Izar,author.; Coles, Matthew J.,author.;
Includes bibliographical references and index.
Subjects: Computer networks; Computer security.;

Cyber smart : five habits to protect your family, money, and identity from cyber criminals / by McDonough, Bart,author.;
Setting the stage -- Overview of cyber risks -- Attackers -- Attack targets and goals -- Attack methods -- Attack chain -- Attack vectors -- Brilliance in the basics -- Mistakes -- Incident response -- Specific recommendations -- Protecting your identity -- Protecting your children -- Protecting your money -- Protecting your email -- Protecting your files -- Protecting your social media -- Protecting your website access and passwords -- Protecting your computer -- Protecting your mobile devices -- Protecting your home wi-fi -- Protecting your IoT devices -- Protecting your information when traveling."In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from: identity theft, compromising your children, lost money, and lost access to email and social media accounts."
Subjects: Computer networks; Computer security.;