Results 51 to 60 of 1,044   |   « previous | next »
    
      - Navigating the cybersecurity career path / by Patton, Helen E.,author.; 
 
      - Includes bibliographical references (pages 287-290) and index.In this book, seasoned cybersecurity executive Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams. This book offers readers succinct explanations of how and why the cybersecurity industry's approach to hiring and promotion is unique and how to use this knowledge to succeed in the field. It also discusses how to progress from an entry-level position in the industry to a more senior position leading security teams and programs.
 
      - Subjects: Handbooks and manuals.; Computer security; Vocational guidance.; 
 
      
      - Security awareness for dummies / by Winkler, Ira,author.(CARDINAL)641368; 
 
      - Make security a priority on your team Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team's willingness to follow their rules and protocols, it's increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies gives you the blueprint for implementing this sort of holistic and hyper-secure program in your organization. Written by one of the world's most influential security professionals--and an Information Systems Security Association Hall of Famer--this pragmatic and easy-to-follow book provides a framework for creating new and highly effective awareness programs from scratch, as well as steps to take to improve on existing ones. It also covers how to measure and evaluate the success of your program and highlight its value to management. Customize and create your own program Make employees aware of the importance of security Develop metrics for success Follow industry-specific sample programs Cyberattacks aren't going away anytime soon: get this smart, friendly guide on how to get a workgroup on board with their role in security and save your organization big money in the long run.
 
      - Subjects: Business enterprises; Computer security.; 
 
      
      - Zero days [videorecording] / by Gibney, Alex,film director,film producer,screenwriter.(CARDINAL)282407; Shmuger, Marc,film producer.; Sanger, David E.,interviewee (expression)(CARDINAL)356232; Kiyaei, Emad,interviewee (expression); Chien, Eric,interviewee (expression); Grieve, Andy,1977-editor of moving image work.; Rossi, Antonio(Antonio M.),director of photography.; Wiley, Brett,director of photography.; Bates, Will,1977-composer (expression); Magnolia Pictures (Firm),presenter.(CARDINAL)300209; Participant Media,presenter.(CARDINAL)300208; Showtime Documentary Films,presenter.(CARDINAL)792098; Global Produce (Firm),production company.; Jigsaw Productions,production company.; Magnolia Home Entertainment (Firm),publisher.(CARDINAL)300206; 
 
      - DVD, NTSC, region 1; widescreen presentation (1.78:1 aspect ratio); 5.1 Dolby Digital.Featuring David Sanger, Emad Kiyaei, Eric Chien.Editor, Andy Grieve ; original music, Will Bates ; cinematography, Antonio Rossi, Brett Wiley.MPAA rating: PG-13 (parents strongly cautioned; some material may be inappropriate for children under 13) for some strong language.A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex Gibney.Evil and good -- Deep analysis -- Magic numbers -- Isotope 236 -- Physical tests -- Cyber warfare unit -- New territory -- Fooling the system -- Pandora's box -- Doctrine -- The most vulnerable.
 
      - Subjects: Documentary films.; Nonfiction films.; Feature films.; Feature films; Video recordings for the hearing impaired.; Computer crimes.; Computer security.; Malware (Computer software); Hackers.; 
 
      
      - CC certified in cybersecurity all-in-one exam guide / by Chapple, Mike,1975-author.(CARDINAL)848342; 
 
      
      - Subjects: Examinations.; Study guides.; Computer security; 
 
      
      - CC Certified in Cybersecurity Cert Guide / by Galloway, Mari,author.; Jamali, Amena,author.; 
 
      - Includes bibliographical references and index.Trust the best-selling Cert Guide series from Pearson IT Certification to help you learn, prepare, and practice for the CC Certified in Cybersecurity exam. Well regarded for its level of detail, study plans, assessment features, and challenging review questions and exercises, CC Certified in Cybersecurity Cert Guide helps you master the concepts and techniques that ensure your exam success. Expert authors Amena Jamali and Mari Galloway share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills.
 
      - Subjects: Computer security; 
 
      
      - No safe harbor : the inside truth about cybercrime--and how to protect your business / by Sangster, Mark,author.; 
 
      - Includes bibliographical references (pages 161-169) and index.Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure.
 
      - Subjects: Business enterprises; Computer security.; Computer crimes.; 
 
      
      - Spies, lies, and cybercrime : cybersecurity tactics to outsmart hackers and disarm scammers / by O'Neill, Eric,1973-author.https://id.oclc.org/worldcat/entity/E39PBJd8f9W8D3D6pcj8Ck6Yfqhttps://isni.org/isni/0000000501733553(CARDINAL)804789; 
 
      - Includes bibliographical references.Part I: Think like a spy. The house is burning down -- The cloak-and-dagger game -- Deception: How an email launched a war -- Impersonation: How to skip school -- Impersonation: Deepfakes -- Infiltration: The Trojan Horse -- Infiltration: Indomitable weeds -- Confidence: "I want to believe" -- Confidence: Question everything -- Exploitation: Spelunking into a nightmare -- Exploitation: No blank pages -- Destruction: Inside the fishbowl -- Destruction: Up at night -- Part II: Act like a spy hunter. Intro to PAID -- Prepare -- Assess -- Investigate -- Decide -- Congratulations, spy hunter -- The spy hunter tool kit."Cybercriminals, domestic and foreign, are launching attacks day and night using malware, phishing scams, deepfakes, and other unscrupulous schemes designed to steal your data and hold it hostage. When they win, it costs nations, businesses, and individuals trillions of dollars annually. It's possible to fight back, but you'll need more than a strong password. Drawing on his years as an FBI spy hunter and national security strategist, Eric O'Neill casts light on these malicious actors' tactics for stealing personal data and exploiting victims. Armed with this knowledge, O'Neill shares his method--called PAID--that you can use to defend yourself and stop attackers in their tracks: Prepare: Pinpoint your most critical data, identify where it resides and who can access it, and build your defenses around it. Assess: Continuously reassess your security and apply counterintelligence tactics to identify scams and cyberattacks. Investigate: Stay educated and hunt the threat before the threat hunts you. Decide: Using your new aptitude, make smart, rapid decisions under pressure. Written by a top expert in the field, Spies, Lies, and Cybercrime offers easy-to-follow steps for staving off cyberattacks, securing your data, and keeping private information safe in an increasingly digital and dizzying world"--
 
      - Subjects: Computer crimes; Computer security.; 
 
      
      - Parenting for the digital generation : the parent's guide to digital education and the online environment / by Garon, Jon M.,author.(CARDINAL)459016; 
 
      - Includes bibliographical references and index.Creating a healthy digital family -- Managing online engagement -- Information and digital literacy -- Online education fundamentals -- How to be an engaged parent in online and blended education -- Equity and equality for online and blended education -- Beyond high school : the professional online presence -- Copyright, creativity, and the teen artist -- Mature and explicit content -- Cyberstalking and online harassment -- Radicalization -- The dark web -- My child the hacker -- Everyday safety online : safe shopping, consumer privacy, and government's rights to search -- Protecting against identity theft and fraud : a nontechnical introduction to cybersecurity fo the family."Reviews the broad landscape of legal and practical issues facing parents and adolescents when using smart phones and online technologies"--
 
      - Subjects: Internet and children.; Computer security.; Parenting.; 
 
      
      - Hacking exposed : malware and rootkits : security secrets & solutions / by Elisan, Christopher C.,author.(CARDINAL)606072; Davis, Michael,1982-author.(CARDINAL)499640; Bodmer, Sean,author.(CARDINAL)564889; LeMasters, Aaron,author.(CARDINAL)563804; 
 
      - Malware -- Rootkits -- Prevention technologies -- Appendix; system integrity analysis: building your own rootkit detector.Fully updated to cover the most current tools, techniques, and exploits, this new edition presents the latest Hacking Exposed strategies for defending against the world's number one attack type: malware.
 
      - Subjects: Computer security.; Computer networks; Malware (Computer software); Rootkits (Computer software); 
 
      
      - 
        Maximum Linux security : a hacker's guide to protecting your Linux server and workstation /
      
 
      
      - Subjects: Linux.; Operating systems (Computers); Computer security.; 
 
      
    
    Results 51 to 60 of 1,044   |   « previous | next »