Catalog Search Results
Author
Publisher
Rowman & Littlefield
Pub. Date
2016.
Language
English
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
Author
Publisher
Twenty-First Century Books
Pub. Date
[2021]
Language
English
Description
"As the digital world grows, teens must be aware of threats to their online privacy and security. This book details forms of cyberspying, explores careers in cyberintelligence, and looks at various online threats"--
Author
Pub. Date
2023.
Language
English
Formats
Description
When a routine assignment goes horribly wrong, resulting in her husband’s murder, penetration specialist Jack, now the #1 suspect, goes on the run, deciding who she can trust as she races against time to clear her name and find the real killer.
4) Zero days
Author
Publisher
RedDoor Publishing
Pub. Date
c2019.
Language
English
Description
A deadly virus is threatening the world's computers. It's smart, fast, and developed by a group of elite hackers. It can break through the highest security, crippling any system within seconds. It's the ultimate cyber weapon. Nobody understands the mind of a hacker quite like Chuck Drayton. But he's gone offline, rocked with guilt after a failed operation cost innocent lives. When Chuck is called back into action, he soon gets caught in the perilous...
Author
Publisher
Enslow Publishing
Pub. Date
2020.
Language
English
Description
Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps that both coders and ordinary users of technology can take to improve their computer security. Individual activities explore topics such as encryption,...
6) Hacking
Author
Publisher
ReferencePoint Press
Pub. Date
[2013]
Language
English
Description
Discusses the threat hacking poses to computer security.
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
[2019]
Language
English
Description
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity...
Author
Publisher
Bloomsbury
Pub. Date
2015.
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
10) Cybersecurity
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
[2022]
Language
English
Description
Explore the latest developments in cybersecurity with this essential guide.
12) Cyber wars
Author
Series
Publisher
Cavendish Square
Pub. Date
2018.
Accelerated Reader
IL: MG - BL: 7.8 - AR Pts: 1
Language
English
Description
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace. Cyber Wars traces the outcomes of these efforts through eyewitness accounts, background information about conflicts, and question prompts that encourage critical thinking about the ways that technology affects world events.
13) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2022.
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Publisher
Public Affairs
Pub. Date
2019.
Language
English
Description
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself.
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was...
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was...
15) Sneakers
Publisher
Universal
Pub. Date
2003.
Language
English
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
Author
Publisher
University of Colorado Colorado Springs
Pub. Date
2016.
Language
English
Description
The National Cyber Intelligence Center (NCIC) of Colorado Springs is being developed in cooperation with the Governor's office along with a number of other partners. This collaboration is centered around three broad programmatic areas;1) a program to provide education to public leaders(Cyber Institute-CI), 2) a program to support research, education and training in cyber security(Cyber Research, Education and Training Center -CRETC) and 3) a program...
Author
Series
Publisher
For Dummies
Pub. Date
2021.
Language
English
Description
Make security a priority on your team Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team’s willingness to follow their rules and protocols, it’s increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board...
Author
Language
English
Description
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The...