Search:

Cybersecurity all-in-one for dummies / by Steinberg, Joseph(Cybersecurity expert),author.; Beaver, Kevin,author.; Coombs, Ted,author.; Winkler, Ira,author.;
Subjects: Computer networks; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

How to catch a phish : a practical guide to detecting phishing emails / by Oles, Nicholas,author.;
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis; Identify what information is in an email header; Review header information and extract key indicators or patterns used for detection; Identify signs of a suspicious or malicious email message; Detect the tactics that attackers use in phishing emails; Safely examine email links and attachments; Use a variety of free and simple tools to analyze email messages.
Subjects: Electronic mail messages; Phishing;
Available copies: 1 / Total copies: 1
unAPI

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / by Mitnick, Kevin D.(Kevin David),1963-author.; Vamosi, Robert,author.;
Includes bibliographical references and index.
Subjects: Internet; Computer security.; Data protection.; Privacy, Right of.;
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime - and how to protect your business / by Sangster, Mark,author.;
Includes bibliographic references and index."Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."--
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Click here to kill everybody : security and survival in a hyper-connected world / by Schneier, Bruce,1963-author.;
Includes bibliographical references and index."The Internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the Internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--
Subjects: Computer crimes.; Internet; Internet; Internet;
Available copies: 1 / Total copies: 1
unAPI

Blockchain revolution : how the technology behind Bitcoin is changing money, business, and the world / by Tapscott, Don,author.; Tapscott, Alex,author.;
Includes bibliographical references and index."The first book to explain why blockchain technology will fundamentally change the Internet, what it does, and how we use it. Over the past 30 years, no theorist of the digital age has better explained the next big thing than Don Tapscott. For example, in Wikinomics, Tapscott was the first to show how the Internet provides the first global platform for mass collaboration. Now, he writes about a profound technological shift that will change how the world does business--and everything else--using blockchain technology, which powers the digital currency Bitcoin. The Internet as we know it is great for collaboration and communication, but is deeply flawed when it comes to commerce and privacy. The new blockchain technology facilitates peer-to-peer transactions without any intermediary such as a bank or governing body. Keeping the user's information anonymous, the blockchain validates and keeps a permanent public record of all transactions. That means that your personal information is private and secure, while all activity is transparent and incorruptible--reconciled by mass collaboration and stored in code on a digital ledger. With its advent, we will not need to trust each other in the traditional sense, because trust is built into the system itself. Although many opportunities for the blockchain require a digital currency, Bitcoin is only one application of this great innovation in computer science. The blockchain can hold any legal document, from deeds and marriage licences to educational degrees and birth certificates. Call it the World Wide Ledger. It enables smart contracts, decentralized autonomous organizations, decentralized government services, and transactions among things. The Internet of Everything needs a Ledger of Everything: the blockchain is a truly open, distributed, global platform that fundamentally changes what we can do online, how we do it, and who can participate. Tapscott, writing with his son Alex, a financial analyst and technologist, argues that the blockchain will shape the next era of prosperity--in finance, business, healthcare, education, governance, and beyond."--Provided by publisher.
Subjects: Data encryption (Computer science); Electronic commerce.; Electronic funds transfers;
Available copies: 1 / Total copies: 1
unAPI

Staying safe online / by Hubbard, Ben,1973-;
Includes bibliographical references and index.RL: K-2; IL: K-2.LSC
Subjects: Internet and children; Internet; Online etiquette;
Available copies: 1 / Total copies: 1
unAPI

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / by Shapiro, Scott J.,author.;
Includes bibliographical references (pages 331-402) and index."A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
Subjects: Case studies.; Hacking.; Hacking; Internet in espionage.; Internet; Phishing.; Phishing;
Available copies: 1 / Total copies: 1
unAPI

Super social media and awesome online safety / by Gifford, Clive.;
Includes bibliographical references, Internet addresses and index."This important book explains how the code behind social media networks connects people around the world. Young readers will learn how networks are built using algorithms, how they communicate using messaging systems, and how privacy settings, IP addresses, and cookies work. The dangers of talking to strangers online are discussed, and readers are encouraged to think about how to participate on social networks safely and responsibly"--Provided by publisher.Guided reading: T.LSC
Subjects: Online social networks; Social media; Computer networks; Internet and children; Online social networks; Social media;
Available copies: 1 / Total copies: 1
unAPI

Protect your data and identity online / by Carser, A. R.;
Includes bibliographical references and index.An unexpected whisper -- Who has your data? -- The history of protecting personal data -- Warning signs -- Protecting personal data."Protect Yourself Online examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly"--Provided by publisher.Grades 7-9.LSC
Subjects: Computer crimes; Internet; Privacy; Data protection;
Available copies: 1 / Total copies: 1
unAPI