Search:

Networking all-in-one for dummies / by Lowe, Doug,1959-;
LSC
Subjects: Computer networks.;
Available copies: 0 / Total copies: 1
unAPI

Unofficial guide to FamilySearch.org : how to find your family history on the world's largest free genealogy website / by McCullough, Dana,author.;
Includes bibliographical references and index.
Subjects: Genealogy;
Available copies: 1 / Total copies: 1
unAPI

Cybersecurity all-in-one for dummies / by Steinberg, Joseph(Cybersecurity expert),author.; Beaver, Kevin,author.; Coombs, Ted,author.; Winkler, Ira,author.;
Subjects: Computer networks; Computer security.;
Available copies: 0 / Total copies: 1
unAPI

The genealogist's Internet : the essential guide to researching your family history online / by Christian, Peter.; National Archives (Great Britain);
Includes bibliographical references (p. [412]), Internet addresses and index.LSC
Subjects: Genealogy; Genealogy.;
© 2012., Bloomsbury,
Available copies: 1 / Total copies: 1
unAPI

Hacking / by Beaver, Kevin,author.;
Includes bibliographical references and index.pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes.Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.
Subjects: Computer security.; Computer networks; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

Genealogy for dummies / by Helm, Matthew.; Helm, April Leigh.;
Includes Internet addresses and index.LSC
Subjects: Genealogy.; Genealogy;
Available copies: 1 / Total copies: 1
unAPI

The 2-hour job search : using technology to get the right job faster / by Dalton, Steve,1976-author.;
Includes bibliographical references and index."Use the latest technology to target potential employers and secure the first interview--no matter your experience, education, or network--with these revised and updated tools and recommendations"--
Subjects: Job hunting.; Job hunting; Career development;
Available copies: 1 / Total copies: 1
unAPI

Facebook for dummies / by Abram, Carolyn.; Karasavas, Amy.;
LSC
Subjects: Facebook (Electronic resource); Online social networks.; Social networks;
Available copies: 1 / Total copies: 1
unAPI

The Usborne book of castles / by Sims, Lesley; Groebner, Dominic.; Chisholm, Jane;
Includes Internet addresses and index.Describes the lives of those who lived in castles, and the tactics for capturing or defending a castle. Includes Internet addresses throughout the book for more information on particular topics.
Subjects: Civilization, Medieval; Castles; Castles;
© 2002., Usborne,
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime - and how to protect your business / by Sangster, Mark,author.;
Includes bibliographic references and index."Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."--
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI