Search:

Betrayed / by York, Rebecca.; Glick, Ruth,1942-;
Subjects: Love stories.; Security consultants; Employees;
Available copies: 1 / Total copies: 1
unAPI

World order / by Kissinger, Henry,1923-;
Includes bibliographical references and index.
Subjects: Security, International.; World politics;
Available copies: 1 / Total copies: 1
unAPI

Zerøes / by Wendig, Chuck.;
LSC
Subjects: Suspense fiction.; Spy stories.; Hackers; Cyber intelligence (Computer security);
Available copies: 1 / Total copies: 1
unAPI

Under fire / by Cole, Scarlett.;
LSC
Subjects: Romantic suspense fiction.; Women scientists; Private security services;
Available copies: 1 / Total copies: 1
unAPI

Blue future : protecting water for people and the planet forever / by Barlow, Maude,author.;
Includes bibliographical references and index.
Subjects: Droughts.; Right to water.; Water security.; Water-supply.;
Available copies: 1 / Total copies: 1
unAPI

The age of walls : how barriers between nations are changing our world / by Marshall, Tim,1959-author.;
Includes bibliographical references (pages 259-264) and index."Tim Marshall ... analyzes the most urgent and tenacious topics in global politics and international relations by examining the borders, walls, and boundaries that divide countries and their populations. The globe has always been a world of walls, from the Great Wall of China to Hadrian's Wall to the Berlin Wall. But a new age of isolationism and economic nationalism is upon us, visible not just in Trump's obsession with building a wall on the Mexico border or in Britain's Brexit vote but in many other places as well. China has the great Firewall, holding back Western culture. Europe's countries are walling themselves against immigrants, terrorism, and currency issues. South Africa has heavily gated communities, and massive walls or fences separate people in the Middle East, Korea, Sudan, India, and other places around the world. In fact, at least sixty-five countries, more than a third of the world's nation-states, have barriers along their borders. There are many reasons why walls go up, because we are divided in many ways: wealth, race, religion, and politics, to name a few. Understanding what is behind these divisions is essential to understanding much of what's going on in the world today"--
Subjects: World politics.; Geopolitics.; Walls.; Boundaries.; Border security.;
Available copies: 1 / Total copies: 1
unAPI

Margo's got money troubles : a novel / by Thorpe, Rufi,author.;
"A bold, laugh-out-loud funny, and heartwarming story about one young woman's attempt to navigate adulthood, new motherhood, and her meager bank account in our increasingly online world-from the PEN/Faulkner finalist and critically acclaimed author of The Knockout Queen"--
Subjects: Humorous fiction.; Bildungsromans.; Novels.; Financial security; Internet personalities; Young women;
Available copies: 0 / Total copies: 1
unAPI

How to catch a phish : a practical guide to detecting phishing emails / by Oles, Nicholas,author.;
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis; Identify what information is in an email header; Review header information and extract key indicators or patterns used for detection; Identify signs of a suspicious or malicious email message; Detect the tactics that attackers use in phishing emails; Safely examine email links and attachments; Use a variety of free and simple tools to analyze email messages.
Subjects: Electronic mail messages; Phishing;
Available copies: 1 / Total copies: 1
unAPI

The ultimatum / by Robards, Karen,author.;
Subjects: Thrillers (Fiction); Swindlers and swindling; Private security services;
Available copies: 1 / Total copies: 2
unAPI

The ransomware hunting team : a band of misfits' improbable crusade to save the world from cybercrime / by Dudley, Renee,1985-author.; Golden, Daniel,1957-author.;
Includes bibliographical references and index."The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Subjects: Computer crimes; Computer security.; Malware (Computer software);
Available copies: 1 / Total copies: 1
unAPI