Catalog Search Results
Author
Language
English
Formats
Description
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems...
Author
Publisher
Wiley
Language
English
Formats
Description
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware...
Author
Language
English
Formats
Description
An accessible introduction to cybersecurity concepts and practices
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires
...Author
Language
English
Formats
Description
The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming each one more pernicious than the last from China, Russia, Iran, North Korea, the Middle East, and points...
Author
Language
English
Formats
Description
Axiom Business Book Award Silver Medalist in Business TechnologyThe indispensable guide to data-powered marketing from the team behind the data management platform that helps fuel Salesforce―the #1 customer relationship management (CRM) company in the worldA tectonic shift in the practice of marketing is underway. Digital technology, social media, and e-commerce have radically changed the way consumers access information, order...
Author
Language
English
Formats
Description
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services...
Author
Publisher
Titan
Pub. Date
2017.
Language
English
Formats
Description
Based on the internationally-acclaimed sci-fi property, "GHOST IN THE SHELL" follows the Major, a special ops one-of-a-kind human-cyborg hybrid, who leads the elite task force Section 9. Devoted to stopping the most dangerous criminals and extremists, Section 9 is faced with an enemy whose singular goal is to wipe out Hanka Robotic's advancements in cyber technology.
10) The spy and I
Author
Series
My spy volume 1
Pub. Date
2024.
Language
English
Description
"Right place. Wrong person. After a case of mistaken identity, one woman must work with her sister's sexy spy partner to save the world in this heart-pounding romantic comedy. The first thing to know about Dove Barkley is that, even though she works as a cyber security analyst, she is one hundred percent not an undercover CIA operative. But when a group of bad guys mistake her for her super-spy sister (news to her!), Dove gets roped into a dangerous...
11) Falcon
Author
Series
Quiet professionals volume 3
Pub. Date
2015
Language
English
Formats
Description
Special Forces operator Salvatore "Falcon" Russo vowed to never again speak to or trust Lieutenant Cassandra Walker after a tragedy four years ago. But as Raptor closes in on the cyber terrorists responsible for killing two of their own, Sal must put his life-- and the lives of his teammates-- in her hands. Cassie is ill-prepared for Falcon's resistance and the fallout. As allies become enemies and hostiles become unlikely partners, Raptor fights...
Author
Language
Español
Description
Del mismo autor de los Bestsellers "El Código Da Vinci" y "Ángeles y demonios," FonoLibro les trae una apasionante novela llena de claves secretas, mensajes ocultos, engaños y crímenes.
"Fortaleza Digital" los mantendrá en suspenso y no podrá dejar de escucharlo hasta que llegue al final. La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa...
Author
Language
English
Formats
Description
"This incisive and important book investigates the creation and history of our financial Internet, the vulnerabilities of our current data storage and sharing platforms, the pitfalls and potential that cryptocurrency holds, the promise that quantum computing and the blockchain offer, and how we can - and must - make a stronger and safer Internet"--
Author
Publisher
O'Reilly Media
Pub. Date
2019.
Language
English
Formats
Description
If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI's availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion...
Author
Language
English
Formats
Description
"In The CEO's Digital Survival Guide: A Practical Handbook to Navigating the Future, Nathan Whittacre gives access to the fundamentals of basic operations, features, and the limitations of different computer networks available today. Nathan has years of experience creating systems and processes to help CEOs run their businesses. He gives an easy-to-follow overview of what every CEO needs to know in order to be able to systematically understand, analyze...
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Language
English
Formats
Description
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side. Criminals are often the earliest, and most innovative, adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and erasing computer servers. It's disturbingly easy to activate baby monitors to spy on families, to hack pacemakers to deliver a lethal jolt of electricity,...
Author
Language
English
Description
"The president's new cybersecurity team, Net Force, is up and running. But a political deadlock in Washington makes the young agency dangerously vulnerable to the criminals, terror groups and hostile governments who would use the digital space to advance their destructive goals. In Central Europe, an unknown enemy mounts a crippling high-tech assault against the organization's military threat-response unit on its home base. The strike casts suspicion...
Author
Language
English
Formats
Description
"Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store...