Results 31 to 40 of 1,043 | « previous | next »
- Cybersecurity for beginners / by Meeuwisse, Raef.(CARDINAL)679149;
- Cybersecurity & its origins -- About the case studies -- Case study - Target 2013 -- The disciplines within cybersecurity -- Case study - Edward Snowden 2013 -- Basic cybersecurity concepts: Identity ; Protect ; Detect, respond and recover ; Repeat and refine ; Defense in depth -- Human factors -- Technical cybersecurity -- Evolving attack and defense methods -- Case study - Sony (2014) -- The cybersecurity cold war -- Risk-based cybersecurity & stacked risk -- How cyber exposed are you? -- What to do when things go wrong -- A glimpse toward the future -- Bringing it all together -- Cybersecurity to English discionary.This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. <p> 'The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.' <p> ALSO featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.
- Subjects: Computer security.; Computer networks; Computer crimes.;
- Hacking for dummies / by Beaver, Kevin,author.(CARDINAL)673284;
- Subjects: Computer security.; Computer networks; Hackers.;
- Hacking / by Beaver, Kevin M.,author.;
- pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.Includes bibliographical references and index.
- Subjects: Computer security.; Computer networks; Hackers.;
- Malware : fighting malicious code / by Skoudis, Ed.(CARDINAL)539459; Zeltser, Lenny.(CARDINAL)675050;
- Includes bibliographical references and index.Describes various types of malware, including viruses, worms, user-level RootKits, and kernel-level manipulation, their haracteristics and attack method, and how to defend against an attack.
- Subjects: Computer crimes.; Computer networks; Computer security.;
- See yourself in cyber : security careers beyond hacking / by Adams, Ed(Cybersecurity expert),author.(CARDINAL)892406;
- The many colors of cybersecurity -- Cybersecurity roles in action.In this book, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in your organization--inhabiting a variety of roles not traditionally associated with cybersecurity--can contribute to improving its cybersecurity backbone. You'll discover how developers, DevOps professionals, managers, and others can strengthen your cybersecurity. You'll also find out how improving your firm's diversity and inclusion can have dramatically positive effects on your team's talent.
- Subjects: Computer security;
- Coding for digital security / by Harris, Patricia,1943 October 17-author.(CARDINAL)426411;
- Stop, thief! -- Avoiding identity theft -- Cybercrimes -- Internet of things -- Software piracy -- Digital defenders -- Protecting companies and the government -- A growing problem.In this book, readers will learn expert tips to make sure their passwords are secure and their log-in information is safe. They ll also learn more about the cyberwar that happens every day on the Internet as security experts and malicious hackers do battle. Topics include passwords, encryption, network security, and cyberterrorism. Readers will also learn about the power and importance of really, really big prime numbers. Diagrams and accessible text help make this the perfect guide to digital security readers will decode the secrets of this book and see if they can crack the security code embedded within.1000LAccelerated Reader AR
- Subjects: Computer security;
- NARA computer security guide. by United States.National Archives and Records Administration.(CARDINAL)178610;
- NARA's seven basic rules for computer security -- Pick a perfect password -- Expectation -- Virus threats -- Virus identification -- Virus hoaxes -- Virus detection and prevention tips.
- Subjects: United States. National Archives and Records Administration; Computer security;
- Sneakers [videorecording] / by Aykroyd, Dan,actor.(CARDINAL)348272; Horner, James,composer.(CARDINAL)731423; Kingsley, Ben,1943-actor.(CARDINAL)349063; Lasker, Lawrence,film producer,screenwriter.(CARDINAL)843820; Lindley, John(John W.),cinematographer.; Marsalis, Branford,actor.(CARDINAL)347267; McDonnell, Mary,actor.; Parkes, Walter F.,screenwriter,film producer.; Phoenix, River,actor.(CARDINAL)740536; Poitier, Sidney,actor.(CARDINAL)145263; Pollack, Bernie,costume designer.; Redford, Robert,actor.(CARDINAL)159804; Robinson, Phil Alden,film director,screenwriter.(CARDINAL)844408; Rolf, Tom,editor of moving image work.(CARDINAL)849029; Strathairn, David,actor.(CARDINAL)434933; Von Brandenstein, Patrizia,production designer.; Universal Pictures (Firm)(CARDINAL)318695;
- Director of photography, John Lindley ; editor, Tom Rolf ; music, James Horner ; costume designer, Bernie Pollack ; production designer, Patrizia Von Brandenstein.Robert Redford, Dan Aykroyd, Ben Kingsley, Mary McDonnell, River Phoenix, Sidney Poitier, David Strathairn, Branford Marsalis.A thriller about five computer hackers with questionable pasts and an equally questionable government job.MPAA rating: PG-13.DVD, Region 1 encoding, Dolby digital.
- Subjects: Drama.; Feature films.; Thrillers (Motion pictures); Video recordings for the hearing impaired.; Computer security; Hackers;
- If it's smart, it's vulnerable / by Hypponen, Mikko,author.; Moss, Jeff(Computer security expert),writer of foreword.;
- Foreword / Jeff Moss -- Preface -- Saab 9000 Turbo -- The good and bad of the internet: Prehistoric internet ; The first websites ; Linux is the world's most important system ; iPhone vs. supercomputer ; Online communities ; Money is data ; Codes all around us ; Geopolitics ; Security Tetris ; Who are we fighting? ; The Rolex -- Malware : then, now, and in the near future: The history of malware ; Smartphones and malware ; Law enforcement and malware ; Ransomware Trojans -- The human element: The two problems ; The heist ; CEO fraud ; Protecting company networks ; Bug bounties ; Wi-fi terms of use ; Mikko's tips ; Mikko's tips for the startup entrepreneur ; Boat for sale -- What if the network goes down?: Electrical networks ; Security factories ; Hypponen's law ; Dumb devices ; Regulation ; Care software updates -- Online privacy: Life without Google ; Murder charges never expire ; Is Google listening to you? ; Gorillas ; Startup business logic ; Biometrics ; Antisocial media ; Online influencing and elections ; Privacy is dead ; Before and after Gmail ; Encryption techniques ; Data is the new uranium ; CASE Vastaamo -- Cryptocurrencies: The value of money ; Blockchains ; The environmental impacts of Bitcoin ; Playing the market ; Ethereum, Monero, and Zcash ; NFT ; Bitcoin and crime ; Border guards vs. Bitcoin -- Technology, espionage, and warfare online: Cyberweapons ; Technology and warfare ; Under a false flag ; Concealability of cyberweapons ; The fog of cyberwar ; Case Prykarpattyaoblenergo ; Case Pyeongchang ; Governments as malware authors ; Russia and China ; Case Stuxnet ; Damage coverage ; Explosion at the White House ; My boycott of RSA, Inc. -- The future: Artificial intelligence ; Wolverines ; AI will take our jobs ; Smart malware ; Metaverse ; The technology of warfare ; "You are under arrest for a future murder" ; Those who can adapt will prosper ; Tesla ; Trends in technology.
- Subjects: Internet of things; Computer security.;
- Cloud security for dummies / by Coombs, Ted,author.;
- part 1. Getting started with cloud security: Clouds aren't bulletproof ; Getting down to business ; Storing data in the cloud ; Developing secure software ; Restricting access -- part 2. Acceptance: Managing cloud resources ; The role of AIOps in cloud security ; Implementing zero trust ; Dealing with hybrid cloud environments ; Data loss and disaster recovery -- part 3. Business as usual: Using cloud security services ; When things go wrong ; Security frameworks ; Security consortiums -- part 4. The part of tens: Ten steps to better cloud security ; Cloud security solutions.
- Subjects: Cloud computing; Computer networks; Computer security.;
Results 31 to 40 of 1,043 | « previous | next »