Catalog Search Results
1) Zero days
Author
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer"--...
2) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
3) Dark angel
Author
Series
Letty Davenport novels volume 2
Language
English
Description
"Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
Author
Series
Bromance book club volume 3
Pub. Date
2020.
Language
English
Description
"A hacktivist and a cat café owner decode the friend zone in this romantic comedy from the author of Undercover Bromance. Alexis Carlisle and her cat café, ToeBeans, have shot to fame after she came forward as a victim of a celebrity chef's sexual harassment. When a new customer approaches to confide in her, the last thing Alexis expects is for the woman to claim they're sisters. Unsure what to do, Alexis turns to the only man she trusts--her best...
Author
Language
English
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
7) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Formats
Description
Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll have...
8) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Language
English
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Author
Pub. Date
2019.
Language
English
Formats
Description
"This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien"--
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition...
Author
Pub. Date
[2018]
Language
English
Appears on list
Formats
Description
"Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher.
Author
Language
English
Formats
Description
Up-to-date strategies for thwarting the latest, most insidious network attacks. This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating...
Author
Publisher
No Starch Press
Language
English
Formats
Description
Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments...
Author
Publisher
O'Reilly Media
Language
English
Formats
Description
"Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate...
Author
Language
Deutsch
Description
Penetrationstests mit Metasploit als effektiver Teil der IT-Sicherheitsstrategie Der komplette Workflow: Portscanning mit Nmap, Hacking mit Metasploit, Schwachstellen scannen mit Nessus Die Techniken der Angreifer verstehen und geeignete Gegenmaßnahmen ergreifen Metasploit ist ein mächtiges Werkzeug, mit dem auch unerfahrene Administratoren gängige Angriffsmethoden verstehen und nachstellen können. Der Autor erklärt das Framework dabei nicht...
Author
Language
English
Formats
Description
Reimagine the future of the internet All our devices and gadgets from our refrigerators to our home security systems, vacuum cleaners, and stereos are going online, just like our computers did. But once we ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It s Smart, It s Vulnerable, veteran cybersecurity professional Mikko Hypponen...
Author
Publisher
Apress
Language
English
Description
Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request