Results 1 to 10 of 32 | next »
- Firewall [videorecording] / by Ford, Harrison.; Forte, Jon.; Loncraine, Richard.(CARDINAL)845110;
- Director of photography, Marco Pontecorvo ; production design, Brian Morris ; editor, Jim Page ; music, Alexandre Desplat.Harrison Ford, Paul Bettany, Virginia Madsen, Mary Lynn Rajskub, Robert Patrick, Carly Schroeder, Jimmy Bennett, Robert Forster, Alan Arkin.Thieves threaten to kill a bank I.T. expert Jack Stanfield's family if he doesn't hack into a computer system through a firewall he designed in order to transfer 100 million dollars to an offshore account.MPAA rating: PG-13.
- Subjects: Feature films.; Thrillers (Motion pictures, television, etc.); Video recordings for the hearing impaired.; Computer crimes; Crime; Firewalls (Computer security);
- © c2006., Warner Home Video,
- Firewall [videorecording] / by Bettany, Paul,1971-(CARDINAL)357180; Desplat, Alexandre.(CARDINAL)686641; Ford, Harrison,1942-(CARDINAL)740457; Forte, Jon.; Loncraine, Richard.(CARDINAL)845110; Madsen, Virginia,1963-; Beacon Pictures.(CARDINAL)340295; Thunder Road Productions.(CARDINAL)813682; Village Roadshow Pictures.(CARDINAL)340620; Warner Bros. Pictures (1969- ); Warner Home Video (Firm)(CARDINAL)218485;
- Director of photography, Marco Pontecorvo ; production design, Brian Morris ; editor, Jim Page ; music, Alexandre Desplat.Harrison Ford, Paul Bettany, Virginia Madsen, Mary Lynn Rajskub, Robert Patrick, Carly Schroeder, Jimmy Bennett, Robert Forster, Alan Arkin.Thieves threaten to kill a bank I.T. expert Jack Stanfield's family if he doesn't hack into a computer system through a firewall he designed in order to transfer 100 million dollars to an offshore account.MPAA rating: PG-13.DVD, Dolby digital 5.1 surround.
- Subjects: Thrillers (Motion pictures, television, etc.); Feature films.; Video recordings for the hearing impaired.; Computer crimes; Crime; Firewalls (Computer security);
- For private home use only.
- Combating computer viruses / by Shea, John M.(CARDINAL)397472;
- An unseen enemy -- What is a computer virus? -- Viruses, trojans, and worms, oh my! -- E-mail viruses -- Looking for trouble : antivirus software -- Firewalls -- Prevention is the best medicine -- Have a backup plan.Explains what computer viruses are, e-mail viruses, speaks of anitvirus software, firewalls, prevention and much, much more.Accelerated Reader AR
- Subjects: Computer viruses; Firewalls (Computer security);
- Firewalls don't stop dragons : a step-by-step guide to computer security and privacy for non-techies / by Parker, Carey,author.;
- Includes bibliographical references and index.Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people--though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards--not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations.
- Subjects: Computer security.; Data protection.;
- Linux firewalls / by Ziegler, Robert L.(Robert Loren),1954-(CARDINAL)223532;
- Subjects: Linux.; Computer security.;
- Networking A to Z / by Muller, Nathan J.;
- A reference guide to networking multiple computers including security, firewalls, wireless LANS, and more.10-A.
- Subjects: Microsoft Windows (Computer file); Business networks.; Computer networks.;
-
Maximum Linux security : a hacker's guide to protecting your Linux server and workstation /
- Subjects: Linux.; Operating systems (Computers); Computer security.;
- Facial recognition and other security tech / by Woolf, Alex,1964-author.(CARDINAL)671811; Evans, Tom(Art director),editor.(CARDINAL)794663; World Book, Inc.(CARDINAL)170438;
- Introduction -- Facial recognition -- Biometrics -- Cybersecurity -- Surveillance -- Access control."The discoveries and inventions of today are poised to change the way you live in the near future. Today, the internet allows unprecedented global connectivity, enabling people to communicate and share information effortlessly. In our modern, digitally connnected world, security is more imporant that ever. Now, we use both physical walls and computer firewalls to protect our information. In Facial Recognition and Other Security Tech, you'll read all about the new technology transforming the way we protect ourselves."-- Back cover.Ages 9-17
- Subjects: Informational works.; Illustrated works.; Human face recognition (Computer science);
- Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
- Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
- Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
- The healthy PC : preventive care, home remedies, and green computing / by Hart-Davis, Guy.(CARDINAL)352260; Holzman, Carey.Healthy PC.;
- Machine generated contents note: Part I Preventive Maintenance -- Chapter 1 System Optimization Tips & Tricks -- Chapter 2 Other Ways to Increase System Performance -- Chapter 3 Backing Up Your Computer -- Part II Computer Security -- Chapter 4 Anti-virus, Anti-spyware, and Firewalls -- Chapter 5 E-mail, Spam, and Hoaxes -- Chapter 6 Passwords -- Part III The Internet -- Chapter 7 The Dangers of WiFi -- Chapter 8 How to Surf Safely -- Chapter 9 Optimizing Your Internet Connection -- Part IV Operating Systems -- Chapter 10 Upgrading Your Operating System -- Chapter 11 32-bit vs. 64-bit: What Does It Mean and Why Should You Care? -- Appendix A What to Do When Things Go Wrong -- Appendix B Free Technical Support -- Appendix C Computer User Groups -- Appendix D 50 Safe and Free Software Utilities Recommended by Steve Bass -- Appendix E Safe and Free Software Recommended by Mr. Modem."Save yourself time, money, and frustration by becoming your own computer guru. The Healthy PC: Preventive Care, Home Remedies, and Green Computing, Second Edition shows you how to find out what's wrong with your PC and solve the problems yourself. You'll get expert tips for making your PC start up faster, keeping its hard drive in good shape, and updating Windows with the latest security fixes. This hands-on guide also explains how to protect your PC for free using Microsoft Security Essentials, use the Internet safely, and configure parental controls to protect your children both online and offline"--"The latest techniques for keeping your PC running at peak performance--without spending a lot of money!Written by the co-host of the longest-running, nationally syndicated radio talk show on computers, "Computer America", The Healthy PC, Second Edition shows you how to maintain your PC's performance and prevent problems before they happen. Using easy-to-follow steps and clear instructions, the book teaches you how to keep your computer in top condition, diagnose and fix common problems, and improve overall performance. No prior experience or knowledge is needed! Get tips on saving money with free, quality software and free tech support websites. The author developed his approach to teaching computer maintenance skills out of more than 20 years of PC repair experience and talking with thousands of customers about their questions and concerns. Learn from the expert!The Healthy PC, Second Edition Provides easy-to-follow, step-by-step instructions with illustrations Shows you how to be proactive with preventive maintenance and how to detect problems before they happen Features clear and concise language that makes computer terms and concepts easy to understand Recommends the best free software and tech support websites that can save you thousands of dollars Practical, in-depth coverage: Upgrading Your Operating System; 32-bit vs. 64-bit; The Internet; How to Surf Safely; E-mail, Spam, and Hoaxes; Optimizing Your Internet Connection; Preventive Maintenance; System Optimization Tips & Tricks; Other Ways to Increase System Performance; Backing Up Your Computer; Computer Security; Anti-virus, Anti-spyware, and Firewalls"--Teaches readers how to keep a personal computer in top condition, diagnose and fix common problems, and improve overall performance.
- Subjects: Microcomputers;
Results 1 to 10 of 32 | next »