Catalog Search Results
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Publisher
W.W. Norton & Company
Pub. Date
[c2013]
Language
English
Description
Describes how authorities in Australia, Belgium, Ukraine, and the United States combined forces to respond to a child pornography ring as well as how other criminal sting operations have been policed and patrolled online.
Author
Publisher
Arcler Press
Pub. Date
2023.
Language
English
Description
Now a Days, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks....
Author
Language
English
Appears on these lists
Formats
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
This program will show you recommended ways of handling difficult situations that your library and staff may encounter. Among the issues covered are potentially violent patrons, bomb threats, sexual harassment, and inappropriate Internet browsing. "Highly recommended ..." - Video Librarian.
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Language
English
Formats
Description
Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that...
Author
Publisher
Atlantic Publishing Group Inc
Pub. Date
2012.
Language
English
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc., spam costs more than $712 per employee in productivity and computing resources each year. Spyware slows computers, ruins files, and can result in stolen information. According to the same Nucleus Research report, businesses lose more than...
13) Flawless
Publisher
Magnolia Home Entertainment
Pub. Date
2008, c2006
Language
English
Description
In 1960s London, Laura Quinn, a bright, driven and beautiful executive at the London Diamond Corporation, finds herself frustrated by a glass ceiling after years of faithful employment, and is persuaded by Hobbs, a disgruntled janitor with detailed knowledge of the company's security, to help pull off a daring heist.
14) The red horseman
Author
Series
Language
English
Formats
Description
Jake Grafton, a Defense Intelligence agent, is dispatched to Moscow. His mission is to keep the twenty thousand nuclear weapons from the former Soviet Union from getting on the black market, but there are many who would like to see him fail.
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Publisher
Skyhorse Publishing
Pub. Date
[2020]
Language
English
Description
From data security company Code42, Inside Jobs offers companies of all sizes a new way to secure today's collaborative cultures-one that works without compromising sensitive company data or slowing business down. Authors Joe Payne, Jadee Hanson, and Mark Wojtasiak, seasoned veterans in the cybersecurity space, provide a top-down and bottom-up picture of the rewards and perils involved in running and securing organizations focused on rapid, iterative,...
Author
Language
English
Formats
Description
"A decorated former Air Force pilot. A pregnant flight attendant. A dedicated TSA agent. The fates of these three, and many others, converge in Danielle Steel's gripping new novel--a heart-stopping thriller that engages ordinary men and women in the fight of their lives during a flight from New York to San Francisco. On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another...
Author
Series
Publisher
HarperCollins
Pub. Date
[2015]
Language
English
Description
From New York Times bestselling author James Rollins comes a lightning-paced short story, in which a major attack on U.S. soil can only be stopped by ... The Midnight Watch In the dead of night, a faceless enemy hacks into the Smithsonian Institution's network of servers, but it is only the first strike masking a larger attack. To rescue a biologist trapped in the National Museum of Natural History and to discover the true intent behind an assault...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request