Catalog Search Results
Author
Pub. Date
2016.
Language
English
Appears on list
Formats
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into rhe present Internet age where hackers and surveillance are commonplace.
Author
Pub. Date
2014.
Language
English
Appears on list
Formats
Description
"Harris delves into the frontlines of America's new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before"--Amazon.com.
Author
Publisher
Reaktion Books Ltd
Pub. Date
2020.
Language
English
Description
"On May 4, 2000, an email that read "kindly check the attached LOVELETTER" was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist...
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Appears on list
Description
This book provides a comprehensive summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government--international, national, state, and local, explaining cybercrime in a highly networked world.
Author
Publisher
O'Reilly Media
Pub. Date
2016.
Language
English
Appears on list
Description
"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only...
Publisher
McGraw-Hill
Pub. Date
[2011]
Language
English
Description
This solution driven book provides insights from top experts who walk you through proven approaches to customize a strategy for preventing, detecting, and responding to fraud and corruption by building a culture of ethics and integrity. --from publisher description
Author
Publisher
Penguin Press
Pub. Date
2017.
Language
English
Description
"No single invention of the last half century has changed the way we live now as much as the Internet. Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit...
12) Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Publisher
PublicAffairs
Pub. Date
2018.
Language
English
Description
"Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...
Author
Publisher
No Starch Press
Pub. Date
©2021.
Language
English
Appears on list
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request