Catalog Search Results
Author
Language
English
Formats
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
Author
Series
Language
English
Appears on list
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Series
Language
English
Description
"On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another a smaller Airbus A321. At a security checkpoint, TSA agent Bernice Adams finds a postcard of the Golden Gate Bridge bearing an ambiguous--perhaps ominous--message. Her supervisor dismisses her concerns, but Bernice calls security and soon Ben Waterman arrives. A senior Homeland Security agent, still grappling with...
Author
Language
English
Formats
Description
Bill is an IT manager at Parts Unlimited. It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective...
Author
Language
English
Formats
Description
Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that...
Author
Series
Hugo Marston novels volume 1
Language
English
Appears on list
Description
When his bookseller friend, a former Holocaust survivor and Nazi hunter, is kidnapped and other booksellers are murdered, Hugo Marston, head of security for the U.S. embassy in Paris, discovers a shocking conspiracy.
Language
English
Description
This program will show you recommended ways of handling difficult situations that your library and staff may encounter. Among the issues covered are potentially violent patrons, bomb threats, sexual harassment, and inappropriate Internet browsing. "Highly recommended ..." - Video Librarian.
Author
Language
English
Description
"The explosive inside account of the attack against the U.S. diplomatic and intelligence outposts in Benghazi, Libya On the night of September 11, 2012, the American diplomatic mission at Benghazi, Libya, came under ferocious attack by a heavily armed group of Islamic terrorists. The prolonged firefight, and the attack hours later on a nearby CIA outpost, resulted in the deaths of four Americans, including the American ambassador to Libya, Christopher...
Author
Language
English
Formats
Description
As cyberattacks on computers and other digital devices have proliferated worldwide, so too has the need for cybersecurity analysts. Incidents of hacking and data theft have created higher demand than ever for these professionals. What the job entails, what it pays, and future prospects are discussed along with insights from industry insiders.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Language
English
Formats
Description
"This book explains how attackers leverage human psychology and publicly available information to target and exploit victims, and outlines ways to defend against social engineering attacks. It explores the ethical decision-making process of the social engineer when implementing a phishing engagement. Includes case studies throughout"--
Author
Language
English
Formats
Description
"As the US capitol was attacked on January 6, 2021, the White House went dark for seven hours and thirty-seven minutes. It was my job to turn the lights on. The void happened to overlap with the hours when supporters of former President Trump brawled with police, smashed windows, and rampaged through the halls of Congress as his loss to Joe Biden was being certified. Why the White House went dark, I didn't know, and, in fact, I didn't really care....
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Language
English
Formats
Description
In this gripping account of lies and heroic acts, the New York Times bestselling author of Shadow Warriors investigates the tragedy of Benghazi, putting the events on September 11, 2012 in the larger context of Obama administration policy toward the Middle East.
Author
Series
Language
English
Description
As of 2018 approximately 3.1 billion people, roughly one-third of the world's population, use social media to communicate and connect with others. Yet for some users, what began as a fun habit has grown into a consuming addiction that can have significant negative effects on their lives. Addicted to Social Media presents a realistic picture of addiction, the effects of addiction on people's lives, and how addiction can be overcome.
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request