Search:

Big breaches : cybersecurity lessons for everyone / by Daswani, Neil.(CARDINAL)867148; Elbayadi, Moudy,author.(CARDINAL)868153;
Includes bibliographical references and index.Part 1: The Biggest Breaches -- Chapter 1: The Root Causes -- Chapter 2: The Capital One Breach -- Chapter 3: The Marriott Breach -- Chapter 4: The Equifax Breach -- Chapter 5: Facebook Security Issues and the 2016 US Presidential Election -- Chapter 6: The OPM Breaches of 2014 and 2015 -- Chapter 7: The Yahoo Breaches of 2013 and 2014 -- Chapter 8: The Target and JPMorgan Chase Breaches of 2013 and 2014 -- Part 2: How to Recover -- Chapter 9: The Seven Habits of Highly Effective Security -- Chapter 10: Advice for Boards of Directors -- Chapter 11: Advice for Technology and Security Leaders -- Chapter 12: Technology Defenses to Fight the Root Causes of Breach: Part One -- Chapter 13: Technology Defenses to Fight the Root Causes of Breach: Part Two -- Chapter 14: Cybersecurity Investments -- Chapter 15: Advice for Consumers -- Chapter 16: Applying Your Skills to Cybersecurity -- Chapter 17: Recap.-.The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone--not just techies--to become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such as phishing, malware, third-party compromise, software vulnerabilities, unencrypted data, and more. Cybersecurity affects daily life for all of us, and the area has never been more accessible than with this book. You will obtain a confident grasp on industry insider knowledge such as effective prevention and detection countermeasures, the meta-level causes of breaches, the seven crucial habits for optimal security in your organization, and much more. These valuable lessons are applied to real-world cases, helping you deduce just how high-profile mega-breaches at Target, JPMorgan Chase, Equifax, Marriott, and more were able to occur. Whether you are seeking to implement a stronger foundation of cybersecurity within your organization or you are an individual who wants to learn the basics, Big Breaches ensures that everybody comes away with essential knowledge to move forward successfully. Arm yourself with this book's expert insights and be prepared for the future of cybersecurity.
Subjects: Handbooks and manuals.; Computer security.; Preparedness; Preparedness.; Emergencies.; Emergency management.; Disasters.; Life skills.;

Upgrading and fixing a PC in easy steps : to make your computer faster, more versatile, and more powerful / by Yarnold, Stuart.(CARDINAL)421774;
Subjects: Handbooks and manuals.; Microcomputers; Microcomputers;

Degunking your email, spam, and viruses / by Duntemann, Jeff.(CARDINAL)181030;
Subjects: Handbooks and manuals.; Computer security; Computer viruses; Spam (Electronic mail);

Sandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers / by Greenberg, Andy,author.(CARDINAL)399687;
Includes bibliographical references and index."In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software to shipping. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage--the largest, most devastating cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national stability and security. As the Kremlin's role in meddling in the 2016 election, manipulating foreign governments, and sparking chaos comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the line between digital and physical conflict, between wartime and peacetime, have begun to blur--with world-shaking implications"--
Subjects: Computer crimes; Hackers;

Tricks of the active trader : an insider's techniques for getting the edge / by Weintraub, Neal.(CARDINAL)393747;
Trick: 1 Why are you here? -- Trick: 2 Precious metals are a must for your portfolio -- Trick: 3 Market access: does faster and cheaper always trump slower and more expensive? -- Trick: 4 Save $5,000 on investment advice -- Trick: 5 Always read the fine print -- Trick: 6 Minimizing short-term trading risk: stocks or futures? -- Trick: 7 spiders, diamonds and qubes oh-my! -- Trick: 8 Pump up the volume with Excel -- Trick: 9 Pretend you're a customer -- Tip: 1 Pin drop -- Tip: 2 No cash? Consider a trading arcade, algorithmic trading firm, or FX group -- Prestidigitation: 1 Humility is better than hubris -- Tip: 3 If you can't remember 1929, reflect on September 11 -- Prestidigitation: 2 Is security a problem? -- Tip: 4 Don't count on beginner's luck -- Tip: 5 Action point -- Tip: 6 The government will not protect you -- Tip: 7 A zebra in lion country -- Tip: 8 keep your eye on the ball -- Tip: 9 Meet captain Ron and ship's mate Stubby -- Trap: 1 Insecurity is the enemy -- Trap: 2 You look marvelous; you look too marvelous -- Trap: 3 Electronic trading has trap doors -- Trap: 4 Cramer vs. Kramer vs. Neal -- Trap: 5 Skipping the fundamentals will cost you -- Trap: 6 Money for nothing -- Prestidigitation: 3 Full-service funds or should I say funs? -- Trap: 7 y2= 2px -- Trap: 8 Lisa loves Russell -- Trap: 9 The stock market does not owe you a living -- Trap: 10 Message boards -- Trap: 11 Don't be fooled by randomness -- Prestidigitation: 4 Trading the news -- Hardware, operations, software and the Internet -- Tip: 1 The real commitment -- Tip: 2 PC pioneers can be lead astray -- Tip: 3 To PC or Mac, that is the question -- Tip: 4 Laptops will actually grow legs and walk -- Tip: 5 Monitoring your trading world -- Trick: 1 Be a flasher -- Trick: 2 Improve your screen image -- Trick: 3 the need for CPU speed -- Trap: 1 If you don't know, don't fix it -- Trap: 2 Be careful when you back up -- Trap: 3 The abyss -- Operations -- Tip: 1 People first, computer second -- Tip: 2 Get out of the slow lane -- Tip: 3 Avoid spam or end up eating it -- Tip: 4 It's not your father's email anymore -- Trick: 1 Back up or find your back up against the wall -- Trick: 2 Email client or webmail? with both, you get eggroll -- Trick: 3 There are two ears on that mouse -- Trap: 1 Get out of the dark -- Trap: 2 Avoid malware or get sick quick -- Trap: 3 E-mail can sink your trading -- Software -- Executing the trade without killing it -- Tip: 1 The Internet is your friend -- Tip: 2 Choose a good ISP or lose your choice -- Tip: 3 The need for connection speed -- Tip: 4 Browsing for browsers -- Trick: 1 Bookmark that baby -- Trick: 2 Search the web they weave -- Trick: 3 Save to the web -- Trick: 4 Let the information find you -- Trick: 5 Tidbits -- Trap: 1 Who is that new me? -- Trap: 2 Your kingdom -- Traders notebook -- Trader's notebook: 1 Sooner or later you must excel -- Trader's notebook: 2 Understanding the odds -- Trader's notebook: 3 The Rohr report -- Trader's notebook: 4 Trading software companies -- Trader's notebook: 5 Web sites for traders -- Trader's notebook: 6 If you want to know the markets, know the reports -- Trader's notebook: 7 Trading spreads -- Trader's notebook: 8 Free financial education.
Subjects: Electronic trading of securities.; Speculation.; Stocks.;

2013 : the FBI story. by United States.Federal Bureau of Investigation.Public Affairs Office,author.(CARDINAL)296260;
January 4, 2013: -- Stopping A Suicide Bomber: -- Jihadist planned attack on US capitol -- January 8, 2013: -- Piecing Together Digital Evidence: -- Computer analysis response team -- January 11, 2013: -- Human Trafficking Awareness: -- Targeting traffickers, helping victims -- January 14, 2013: -- Early 2012 Crime Stats: -- Slight uptick in crime -- January 17, 2013: -- Murder-For-Hire: -- Web hits of a deadly kind -- January 22, 2013: -- Abuse Of Trust: -- Mentally disabled used to scam government -- January 25, 2013: -- Byte Out Of History: -- Alger Hiss story -- January 29, 2013: -- FBI En Espanol: -- Spanish language webpage turns 2 -- February 1, 2013: -- Hostage Rescue Team: -- Part 1: 30 years of service to the nation -- February 5, 2013: -- Case Of 'Sextortion': -- Cons like 'Bieber ruse' targeted minor girls -- February 8, 2013: -- Amish Beard-Cutting Case: -- Ohio residents sentenced for hate crimes -- February 12, 2013: -- Hostage Rescue Team: -- Part 2: the crucible of selection -- February 15, 2013: -- Crooked CEO Gets 50 Years: -- Stole $215 million from investors -- February 19, 2013: -- Hostage Rescue Team: -- Part 3: training for every contingency -- February 22, 2013: -- Legal Attache London: -- Then and now -- February 26, 2013: -- Weapon Of Mass Deception: -- Courthouse bomber receives 55-year sentence -- February 28, 2013: -- Cyber Threat: -- Planning for the way ahead -- March 4, 2013: -- Hostage Rescue Team: -- Part 4: an exercise in terror -- March 8, 2013: -- Hostage Rescue Team: -- Part 5: held to a higher standard -- March 12, 2013: -- Organized Retail Theft: -- Major middle eastern crime ring dismantled -- March 14, 2013: -- New Top Ten Fugitive: -- Help us find a murderer -- March 15, 2013: -- Remembering Deke DeLoach: -- Trusted adviser to Edgar Hoover dies at 92 -- March 18, 2013: -- Gardner Museum Theft: -- Reward offered for return of artwork -- March 25, 2013: -- UFOs Or No?: -- Guy Hottel memo -- March 27, 2013: -- Hostage Rescue Team: -- Part 6: Mission in the Gulf of Aden -- April 2, 2013: -- Can You Crack A Code?: -- Try your hand at cryptanalysis -- April 5, 2013: -- Best And Brightest: -- FBI presents director's community leadership awards -- April 9, 2013: -- Rooting Out Corruption: -- Look back at the Jefferson case -- April 12, 2013: -- FBI Gun Collection: -- Firearms that help solve crimes -- April 26, 2013: -- Insider Threat: -- Soldier receives 16-year sentence for attempted espionage -- April 30, 2013: -- Different Kind Of Outreach: -- Evidence response teams connect with kids -- May 2, 2013: -- New Most Wanted Terrorist: -- Joanne Chesimard first woman added to list -- May 7, 2013: -- FBI And Leadership: -- Part 1: Helping employees 'lead where they stand' -- May 10, 2013: -- FBI And Leadership: -- Part 2: Character, courage, competence, and collaboration -- May 10, 2013: -- FBI And Leadership: -- Part 2: Character, courage, competence, and collaboration -- May 14, 2013: -- Police Week: -- Honoring the fallen -- Internet Crime 2012: -- IC3 releases annual report -- May 20, 2013: -- Fix Was In: -- Crime in college hoops -- May 24, 2013: -- Looking For Our Children: -- National missing children's day 2013 -- May 27, 2013: -- Wounded Warriors: -- Helping injured soldiers continue to serve -- May 31, 2013: -- Act Of Terror Averted: -- Would-be bomber sentenced in Chicago -- June 3, 2013: -- Preliminary 2012 Crime Statistics: -- Violent crime up, property crime down -- June 6, 2013: -- Child Abductions: -- When custody issues lead to violence -- June 11, 2013: -- Civil Rights In The 60's: -- Part 1: Justice for Medgar Evers -- June 14, 2013: -- Byte Out Of History: -- Lasting legacy of operation illwind -- June 17, 2013: -- Top Ten At 500: -- Two new fugitives added to list -- June 21, 2013: -- New FBI Director: -- President nominates James B Comey at White House ceremony -- June 25, 2013: -- Race Against Time: -- Holiday bomb threat averted -- June 28, 2013: -- Equine Crime: -- Horse farm of a different color --July 2, 2013: -- Bomb Technicians: -- Equitable partnership between FBI and Navy -- July 5, 2013: -- Terror Financing: -- Tracking the money trails -- July 9, 2013: -- Latent Hit Of The Year Award: -- Fingerprint tool helps solve 1999 murder -- July 12, 2013: -- Map Quest: -- Seeking owners of stolen artwork -- July 16, 2013: -- Homegrown Terrorism: -- Self-radicalized American incited violent Jihad online -- July 19, 2013: -- Cheating In Contracts: -- 30 million case of corruption -- July 23, 2013: -- All In The Family: -- Part 1: Husband, wife, and son stole millions from armored cars -- July 26, 2013: -- All In The Family: -- Part 2: On the trail of armored car robbers -- July 29, 2013: -- Operation Cross Country: -- Recovering victims of child sex trafficking -- August 1, 2013: -- Consumer Alert: -- Pirated software may contain malware -- August 5, 2013: -- Election Hack: -- Stealing votes the cyber way -- August 8, 2013: -- Byte Out Of History: -- Civil rights case one of our first -- August 13, 2013: -- Seeking The Public's Assistance: -- New information released in serial killer case -- August 16, 2013: -- Coin Crime: -- Case of the parking meter thief -- August 20 2013: -- Legal Attache Manila: -- Then and now -- August 23, 2013: -- Serial Bank Robber: -- Help us catch the loan ranger bandit -- August 27, 2013: -- Scamming Nuns: -- Con artist gets his due -- August 30, 2013: -- End Of An Era: -- Robert S Mueller set to step down as FBI director -- September 3, 2013: -- Crime Of 'Swatting': -- Fake 9-1-1 calls have real consequences -- September 6, 2013: -- Transnational Law Enforcement Efforts: -- Helping stem transnational crime -- September 10, 2013: -- Serial Killers: -- Part 1: FBI's role takes shape -- September 13, 2013: -- Civil rights In The '60's: -- Part 2: Retired investigators reflect on 16th Street Baptist Church bombing -- September 16, 2013: -- Latest Crime Stats Released: -- Violent crime up, property crime down -- September 19, 2013: -- Public Corruption: Courtroom For Sale: -- Judge gets jail time in racketeering case -- September 24, 2013: -- New Internet Crime Initiative: -- Combines resources, expertise -- September 26, 2013: -- Sticker Shock: -- Guilty pleas show high cost of price-fixing in auto industry -- September 30, 2013: -- Byte Out Of History: -- Bobby Greenlease kidnapping -- October 18, 2013: -- Prescription For Fraud: -- Internet pharmacy operator gets jail time -- October 23, 2013: -- Serial Killers: -- Part 2: Birth of behavioral analysis in the FBI -- October 25, 2013: -- International Fraud: -- Crime ring recruited sort-term visa holders -- October 28, 2013: -- Risks To The Thin Blue Line: -- Latest law enforcement officers killed and assaulted report released -- October 31, 2013: -- Attorney-Turned-Racketeer: -- Stunning betrayal of the law -- November 5, 2013: -- Fugitives Sought: -- New subjects added to cyber's most wanted list -- November 8, 2013: -- Public Corruption: -- Inside the Kwame Kilpatrick case -- November 15, 2013: -- Serial Killers: -- Part 3: Ted Bundy's campaign of terror -- November 19, 2013: -- Taking Stock: -- Corporate execs get scammed -- November 22, 2013: -- JFK Assassination: -- Former agent recalls his role in the investigation -- November 25, 2013: -- Latest Hate Crime Statistics: -- Annual report shows slight decrease -- November 29, 2013: -- NICS Turns 15: -- Stats show success of FBI's gun background check system -- December 3, 2013: -- Attempted Extortion: -- Aspiring actor's new role: inmate -- December 6, 2013: -- Billion-Dollar Investment Fraud: -- Undercover agents uncover the scheme -- December 9, 2013: -- Byte Out Of History: -- Kidnapping of Frank Sinatra, Jr -- December 12, 2013: -- TEDAC Marks 10-Year Anniversary: -- Potent weapon in the war on terror -- December 17, 2013: -- Legat Copenhagen: -- Partnerships pay dividends at Nordic outpost -- December 20, 2013: -- Serial Infector Gets 39 Years: -- Lined to Hepatitis C outbreak -- December 23, 2013: -- Cyber Stalker: -- Cautionary tale about online romance and revenge -- December 26, 2013: -- Year In Review: -- Look at FBI cases, Part 1 -- Year In Review: -- Look at FBI cases, Part 2.Message From FBI Director James B Comey: This past year, the FBI and its partners again addressed a wide range of national security and criminal threats. Together, we responded to numerous crisis incidents, such as the terrorist bombings of the Boston Marathon and the shootings at the Navy Yard in Washington, DC. We confronted a continued surge of cyber attacks against targets ranging from everyday citizens to our largest and most successful businesses. And we stopped those who would strike at the heart of our communities-from violent gangs and white-collar criminals to child predators and corrupt public officials. A glimpse of the challenges we faced-and what we achieved together-can be found in this latest edition of The FBI Story, our annual collection of news and feature articles from the Bureau's public website. Here you can read about some of our most successful recent major investigations and operations. These include a three-day nationwide sweep targeting child prostitution in which we identified and rescued more than 100 young victims and arrested more than 150 pimps; the rescue of a 5-year-old boy held captive in a heavily armed bunker in Alabama; and uncovering of the largest domestic bribery and bid-rigging scheme in the history of federal contracting cases-one that siphoned more the $30 million dollars of taxpayer money. This edition of the FBI Story also highlights some of the Bureau's remarkable capabilities. You will find a multi-part series on our elite Hostage Rescue Team-which marked its 30th anniversary this past year-and a feature on the Terrorist Explosive Device Analytical Center (TEDAC)-an FBI-established, multi-agency operation that celebrated its 10th anniversary in 2013.
Subjects: United States. Federal Bureau of Investigation.; Criminal investigation; Criminal investigation in mass media.;