Catalog Search Results
Author
Series
Publisher
Rosen Publishing
Pub. Date
2018.
Language
English
Description
Privacy invasion, cyberbullying, and identity theft are vulnerabilities that young people expose themselves to every time they go online. This book explains what sorts of information might be shared, stored, and stolen when using the internet, how to protect online privacy, and what to do after falling victim to digital privacy crimes. Readers will learn about the vulnerabilities of shopping and banking digitally and about how apps can quickly lead...
Author
Series
Publisher
Kogan Page
Pub. Date
2020.
Language
English
Description
The world is more digitally connected than ever before, and with this connectivity comes vulnerability. It is therefore vital that all professionals understand cyber risk and how to minimize it. This means that cyber security skills are in huge demand, and there are vast career opportunities to be taken. Confident Cyber Security is here to help. This jargon-busting guide will give you a clear overview of the world of cyber security. Exploring everything...
64) Internet law
Series
Reference shelf volume 92 no. 4
Publisher
Grey House Publishing
Pub. Date
2020.
Language
English
Author
Publisher
Lucent Press, an imprint of Greenhaven Publishing, LLC
Pub. Date
2019.
Language
English
Description
"When using technology, many of us think the content we look at or type is confidential, however, we have learned people other than those we choose may have access to this information. This engaging text about privacy in the Internet age uncovers the realities of using technology and helps young readers understand that what they do online is seen by outside eyes. This eye-opening main text is supplemented with vibrant, full-color photographs, detailed...
69) Zero days
Publisher
Magnolia Home Entertainment
Pub. Date
[2017]
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
Author
Series
Publisher
ReferencePoint Press
Pub. Date
[2023]
Language
English
Description
"The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about...
Author
Series
Publisher
Oxford University Press, USA
Pub. Date
[2014]
Language
English
Description
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from...
72) Memory piece
Author
Publisher
Riverhead Books
Pub. Date
2024.
Language
English
Description
"In the early 1980s, Giselle Chin, Jackie Ong, and Ellen Ng are three teenagers drawn together by their shared sense of alienation and desire for something different. 'Allied in the weirdest parts of themselves,' they envision each other as artistic collaborators and embark on a future defined by freedom and creativity. By the time they are adults, their dreams are murkier. As a performance artist, Giselle must navigate an elite social world she never...
Author
Publisher
Colorado Secretary of State's Office
Pub. Date
2018.
Language
English
Description
Three initiatives integrate cyber security resources to protect Colorado elections: 1) Securing the statewide voter registration system; 2) Securing overseas and military ballot return with encryption; 3) Colorado threat information sharing and joint fusion center. These initiatives make Colorado one of the safest states to cast a ballot resulting in one of the highest voter turnout.
Author
Series
Pike Logan thrillers volume 17
Language
English
Formats
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
Series
Reference shelf volume 89, no. 2
Publisher
Grey House Publishing
Pub. Date
2017.
Language
English
Description
This volume examines personal cybersecurity and considers net neutrality and government surveillance, new challenges to privacy, and the power and influence of technology.
Author
Series
Publisher
John Wiley & Sons
Pub. Date
[2022]
Language
English
Description
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.
...Author
Series
Publisher
ReferencePoint Press, Inc
Pub. Date
2015.
Language
English
Description
"Recent revelations of extensive government surveillance programs pit privacy concerns against the need to fight terrorism and crime. Using cases involving real people, this book explores how federal agencies, local law enforcement, and even schools are collecting, using and perhaps abusing the personal information they gather online. The book concludes with a discussion of proposed regulations and policies that could strike a better balance between...