Catalog Search Results
Author
Language
English
Description
"A propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, taking once-anonymous realms of money, drugs, and violence and holding them up to the light Black markets have always thrived in the shadows of society. Increasingly, these enterprises-drug dealing, money laundering, human trafficking, terrorist funding-have found their shadows online. Digital crime lords inhabiting lawless corners of the internet have operated...
Author
Language
English
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
3) Version zero
Author
Language
English
Description
"Max, a data whiz at the social media company Wren, has gotten a firsthand glimpse of the dark side of big tech. When he questions what his company does with the data they collect, he's fired...then black-balled across Silicon Valley. With time on his hands and revenge on his mind, Max and his longtime friend (and secretly the love of his life) Akiko, decide to get even by rebooting the internet. After all, in order to fix things, sometimes you have...
Author
Publisher
O'Reilly Media
Pub. Date
2016.
Language
English
Appears on list
Description
"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only...
5) Wired
Author
Series
Pub. Date
2017.
Language
English
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Appears on list
Description
This book provides a comprehensive summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government--international, national, state, and local, explaining cybercrime in a highly networked world.
7) Warcross
Author
Series
Warcross volume 1
Language
English
Appears on these lists
10 Worth Trying: Young Adult Science Fiction [Middle School Readers]
Asian and Pasifika Voices: Books for Teens
TAB 2018 Picks
TAB Top Picks in E-Books or E-Audio
Asian and Pasifika Voices: Books for Teens
TAB 2018 Picks
TAB Top Picks in E-Books or E-Audio
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
Author
Publisher
BCS, The Chartered Institute for IT
Pub. Date
2022
Language
English
Description
Cybercrime is a sad, ever-developing reality of our digital lives. Cybercriminals are ruthless and know how to use persuasion and manipulation to get what they want. We are all in danger of falling victim to their tricks, which can lead to serious consequences for our business, our family and ourselves.This book aims to prepare you to defend yourself against the tactics cybercriminals use, and gives you advice on what you can do if you, or your business,...
Author
Publisher
PACKT PUBLISHING LIMITED
Pub. Date
2023
Language
English
Description
Know your enemy and counter the dark web criminality with this easy-to-follow guide, including a detailed tour of the dark web ecosystem and the tools and tactics used to mitigate cyber threats Key Features Get up to speed with the ins and outs of cybercriminal activity on the dark web Become familiar with the tools and techniques that are used to fight serious crime Gain a keen understanding of the crime ecosystem on the dark web and the best practices...
Author
Publisher
Apress
Pub. Date
[2018]
Language
English
Description
Use the methodology in this study guide to design, manage, and operate a balanced enterprise cybersecurity program that is pragmatic and realistic in the face of resource constraints and other real-world limitations. This guide is an instructional companion to the book Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats. The study guide will help you understand the book's ideas and put them to work. The...
Author
Pub. Date
2019.
Language
English
Description
"This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien"--
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition...
14) Dark angel
Author
Series
Letty Davenport novels volume 2
Language
English
Description
"Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
Author
Publisher
IT Governance Publishing
Pub. Date
2022.
Language
English
Description
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Author
Publisher
BCS, The Chartered Institute for IT
Pub. Date
[2022]
Language
English
Description
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Author
Publisher
Packt Publishing
Pub. Date
2022.
Language
English
Description
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligence Key Features Understand best practices for detecting, containing, and recovering from modern cyber threats Get practical experience embracing incident response using intelligence-based threat hunting techniques Implement and orchestrate different incident response, monitoring, intelligence, and investigation platforms Book...
Author
Series
Geronimo Stilton. Original series volume 68
Language
English
Description
When he begins receiving packages containing useless things he did not order, Geronimo Stilton discovers that someone on the Internet has stolen his identity, a dilemma that compels him to enlist the help of computer expert Professor Margo Bitmouse, who helps Geronimo track down the hacker.
Author
Publisher
Apress
Pub. Date
[2019]
Language
English
Description
Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request