Results 1 to 10 of 422 | next »
- Protecting financial data / by Hulick, Kathryn,author.(CARDINAL)405863;
- Includes bibliographical references (pages 104-108) and index.The victim of an invisible attack -- What is at risk? -- Know the safeguards -- Play your part -- Spy games -- Hackers attack -- Imposters on the prowl -- Life after losing financial data.1060L
- Subjects: Young adult literature.; Young adult literature.; Data protection.; Computer security.; Computer crimes;
- Eyes & spies : how you're tracked and why you should know / by Kyi, Tanya Lloyd,1973-author.(CARDINAL)319317; Wuthrich, Belle,1989-illustrator.(CARDINAL)625200;
- Includes bibliographical references (pages 126-134) and index."This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyberbullying, and online safety."--990L
- Subjects: Young adult literature.; Data protection.; Privacy, Right of.;
- Hackers : aprende a atacar y defenderte / by Gómez López, Julio,Author(DLC)no2007126015; Guillén Núñez, Pedro,Author(DLC)ns2018000305; Castro Simón, Miguel Ángel de,Author(DLC)ns2018000304;
- "The security of computer systems is a crucial element that any administrator must assume as one of its main objectives. The large number of services offered through networks and the Internet has made it vitally important to secure systems against different attacks by hackers. Faced with this problem, the administrator must be prepared to face any attack that may compromise the security of the system. To find a solution to this conflict, the administrator must put himself in the shoes of a hacker and analyze or exploit the security of the system. But is an administrator a hacker? Both have extensive computer skills and analyze the security of companies in search of failures. But the difference lies in their ethics and professionalism. While a hacker ""examines"" a computer system with dubious purposes (economic, revenge, fun, ...) an administrator does it to protect the system against possible hacker attacks. The second edition of the book is presented as an updated edition where you will learn the techniques used to find and check the security failures of a system computer Topics included: ? Chapter 1. Basic concepts, types of attacks and training platforms. ? Chapter 2. Find an attack vector. Location and analysis of an objective, plot of routes and port scanning. ? Chapter 3. Systems hacking. Scanning of vulnerabilities, exploitation of vulnerabilities of a system, attacks against passwords and countermeasures. ? Chapter 4. Network hacking. Man in the middle, Sniffers, Phising, network break wireless, anonymous navigation and countermeasures. ? Chapter 5. Web server hacking. Search for vulnerabilities, attacks by brute force, XSS, RFI, LFI, SQL injection, CSRF and countermeasures. ? Chapter 6. Application hacking. Crack, Hotfuzz, keyloggers, viruses, trojans, rootkits and hiding for the antivirus. "
- Subjects: Computer security.; Data protection.; Hackers.;
- Firewalls don't stop dragons : a step-by-step guide to computer security and privacy for non-techies / by Parker, Carey,author.;
- Includes bibliographical references and index.Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people--though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards--not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations.
- Subjects: Computer security.; Data protection.;
- Environmental GIS, application to industrial facilities / by Douglas, William J.(CARDINAL)147782;
- Includes bibliographical references (pages 117-118) and index.
- Subjects: Geographic information systems.; Industries; Environmental protection;
- Taking control of your personal data. [videorecording] by Golbeck, Jennifer,creator,speaker.; Chartier, Timothy P.,author.Big data: how data analytics is transforming the world, course guidebook.©2014.; Teaching Company,production company,publisher.(CARDINAL)349444;
- Bibliographical references included in course guidebook.Lecturer: Jennifer Golbeck, University of Maryland, College Park.Never before in human history have people been able to share so much about themselves so quickly. Neither have they ever been so exposed to forces that want to take advantage of that capability. This course will open eyes to the surprising extent of that exposure and will discuss options for keeping personal data as safe as possible, help to determine personal privacy profile, and understand the current U.S. laws and proposed state laws regarding privacy.DVD format; NTSC.
- Subjects: Educational films.; Instructional films.; Lectures.; Nonfiction films.; Video recordings for the hearing impaired.; Computer security.; Data protection.; Privacy, Right of.;
- Online privacy / by Marzolf, Julie Schwab.(CARDINAL)400336;
- Online privacy : what is it? -- Who wants your information? -- How to keep information safe -- Cookies in my computer? -- Spyware -- Online detective -- Gone phishing? -- Avoiding cyberbullying -- Think before you send -- Talking to your parents.Accelerated Reader AR
- Subjects: Internet; Computer security.; Data protection.;
- Privacy is hard and seven other myths : achieving privacy through careful design / by Hoepman, Jaap-Henk,author.;
- Includes bibliographical references and index.An expert on computer privacy and security shows how we can build privacy into the design of systems from the start. We are tethered to our devices all day, every day, leaving data trails of our searches, posts, clicks, and communications. Meanwhile, governments and businesses collect our data and use it to monitor us without our knowledge. So we have resigned ourselves to the belief that privacy is hard--choosing to believe that websites do not share our information, for example, and declaring that we have nothing to hide anyway. In this informative and illuminating book, a computer privacy and security expert argues that privacy is not that hard if we build it into the design of systems from the start. Along the way, Jaap-Henk Hoepman debunks eight persistent myths surrounding computer privacy. The website that claims it doesn't collect personal data, for example; Hoepman explains that most data is personal, capturing location, preferences, and other information. You don't have anything to hide? There's nothing wrong with wanting to keep personal information--even if it's not incriminating or embarrassing--private. Hoepman shows that just as technology can be used to invade our privacy, it can be used to protect it, when we apply privacy by design. Hoepman suggests technical fixes, discussing pseudonyms, leaky design, encryption, metadata, and the benefits of keeping your data local (on your own device only), and outlines privacy design strategies that system designers can apply now. -- Provided by publisher."This book debunks 10 myths about how hard it really is to design privacy-friendly systems" --
- Subjects: Computer security.; Data protection.; Privacy.;
- A Report on the new information age : emerging legal and policy problems. by American Bar Association.International Communications Committee.Meeting.(CARDINAL)166470;
- Subjects: Conference papers and proceedings.; Data protection; Computers;
- Protect your data and identity online / by Carser, A. R.,author.(CARDINAL)629978;
- Includes bibliographical references and index.An unexpected whisper -- Who has your data? -- The history of protecting personal data -- Warning signs -- Protecting personal data."Protect Yourself Online examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly"--Grades 7-9.
- Subjects: Computer crimes; Data protection; Internet; Privacy;
Results 1 to 10 of 422 | next »