Catalog Search Results
Author
Language
English
Formats
Description
Cryptographer Susan Fletcher finds herself fighting for her country, her life, and the life of the man she loves when she is called in by the National Security Agency to decipher a mysterious code and discovers a plot that has the power to cripple U.S. intelligence.
Author
Publisher
Babelcube Inc
Pub. Date
[2017]
Language
English
Description
Wireless Hacking 101 - How to hack wireless networks easily! This book is perfect for computer enthusiasts that want to gain expertise in the interesting world of ethical hacking and that wish to start conducting wireless pentesting. Inside you will find step-by-step instructions about how to exploit WiFi networks using the tools within the known Kali Linux distro as the famous aircrack-ng suite. Topics covered: • Introduction to WiFi Hacking •...
Author
Publisher
Arcler Press
Pub. Date
2023.
Language
English
Description
Now a Days, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals, terrorists, and state actors. For example, government agencies and private-sector companies both large and small suffer from cyber thefts of sensitive information, cyber vandalism (e.g., defacing of Web sites), and denial-of-service attacks....
Author
Language
English
Appears on these lists
Formats
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Series
Language
English
Description
Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation's sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture,...
Author
Language
English
Formats
Description
The bestselling author of THE AUTOMATIC MILLIONAIRE offers his innovative financial advice in SMART COUPLES FINISH RICH and SMART WOMEN FINISH RICH, timed to coincide with the publication of his new book, START LATE, FINISH RICH! Fighting about money is the number-one reason for divorce in America. SMART COUPLES FINISH RICH covers a powerful combination of strategies that helps couples work on their finances as a team. Addressing every couple-younger...
Author
Publisher
Weldon Owen
Pub. Date
[2017]
Language
English
Description
"Cybersecurity experts present an accessible, informative, and fully illustrated guide to protecting yourself, your assets, and your loved ones online. As we live more of our lives online, we need to be more aware of the risks we face -- and what we can do to protect ourselves. We all know that our identities can be stolen, and that intellectual property can be copied and sold. But even scarier things are now possible. Vehicle systems can be hacked,...
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Description
Welcome to "Navigating the Dark Waters of Cybersecurity Incident Response," a comprehensive guide that will help you prepare for and respond to cyber attacks. Written by a team of experienced cybersecurity experts, this book provides practical advice, real-world examples, and actionable insights that will help you navigate the complex and often murky world of cybersecurity incident response.
"Navigating the Dark Waters" offers a step-by-step approach...
Author
Language
English
Description
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This eBook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include- using personal mobile devices at work (BYOD), password security, data encryption, raising user awareness, securing networks, legal aspects of...
Author
Publisher
Ulysses Press
Pub. Date
[2015]
Language
English
Description
"Practical, step-by-step strategies for helping your own family, first responders and vulnerable community members during any emergency situation. Eventually, everyone experiences a catastrophic emergency. Whether it's a hurricane that sweeps across their entire state, an earthquake or flood that decimates their home city or a house fire that puts their family in danger. Knowing what to do before, during and immediately after these emergency situations...
Author
Language
English
Description
I am in cybersecurity, but I am not a hacker! This field has many branches and not all of them are deeply technical or hands on. Some of these jobs are high-paying with salaries up to 6 figures.
According to the White House, there are 700,000 cybersecurity positions open today. There is a good chance that you fit into some of these roles.
Using the techniques in this series, you can be a part of one of the fastest, highest paid career paths in IT....
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request