Search:

Cybersecurity all-in-one for dummies / by Steinberg, Joseph(Cybersecurity expert),author.; Beaver, Kevin,author.; Coombs, Ted,author.; Winkler, Ira,author.;
Subjects: Computer networks; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

Hacking for dummies / by Beaver, Kevin,author.;
Subjects: Hacking.; Hackers.; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime - and how to protect your business / by Sangster, Mark,author.;
Includes bibliographic references and index."Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."--
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

The ransomware hunting team : a band of misfits' improbable crusade to save the world from cybercrime / by Dudley, Renee,1985-author.; Golden, Daniel,1957-author.;
Includes bibliographical references and index."The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Subjects: Computer crimes; Computer security.; Malware (Computer software);
Available copies: 1 / Total copies: 1
unAPI

Zerøes / by Wendig, Chuck.;
LSC
Subjects: Suspense fiction.; Spy stories.; Hackers; Cyber intelligence (Computer security);
Available copies: 1 / Total copies: 1
unAPI

Digital data security / by Hudak, Heather C.,1975-;
Includes bibliographical references, Internet addresses, and index.LSC
Subjects: Computer crimes; Computer security;
Available copies: 1 / Total copies: 1
unAPI

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / by Mitnick, Kevin D.(Kevin David),1963-author.; Vamosi, Robert,author.;
Includes bibliographical references and index.
Subjects: Internet; Computer security.; Data protection.; Privacy, Right of.;
Available copies: 1 / Total copies: 1
unAPI

Moving target : a novel / by Preisler, Jerome.; Clancy, Tom,1947-2013.; Pieczenik, Steve R.;
To prevent global chaos, Net Force agent Kali Alcazar, a member of America's elite cyber-defense organization, leads a final strike against the world's most dangerous hacker, discovering too late that he has prepared a deadly trap for them all.
Subjects: Political fiction.; Thrillers (Fiction); Cyber intelligence (Computer security); Cyberterrorism; National security; Adventure stories;
Available copies: 1 / Total copies: 1
unAPI

The wires of war : technology and the global struggle for power / by Helberg, Jacob,author.;
Includes bibliographical references and index.From Jacob Helberg, the former News Policy lead at Google, comes an urgent and groundbreaking account of the high-stakes global cyberwar brewing between Western democracies and the autocracies of China and Russia that could potentially crush democracy.
Subjects: Computer networks; Computer security.; Cyber intelligence (Computer security); Cyberspace operations (Military science); Cyberspace; Internet and international relations.; Technological innovations.; Technology and international relations.; Technology;
Available copies: 1 / Total copies: 1
unAPI

The Director : a novel / by Ignatius, David,1950-;
Subjects: Spy stories.; United States. Central Intelligence Agency; Computer crimes; Computer hackers; Computer networks;
Available copies: 1 / Total copies: 1
unAPI