Catalog Search Results
Showing Results using Keyword index
Author
Pub. Date
2014.
Language
English
Appears on list
Formats
Description
"Harris delves into the frontlines of America's new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before"--Amazon.com.
Author
Publisher
No Starch Press
Language
English
Appears on list
Formats
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"-- Provided by publisher.
Author
Pub. Date
2016.
Language
English
Appears on list
Formats
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into rhe present Internet age where hackers and surveillance are commonplace.
Author
Publisher
IT Governance Publishing
Pub. Date
2022.
Language
English
Description
An accessible introduction to the most prevalent cyber threats in our current climate, this book discusses cyber terrorism, phishing, and ransomware attacks, and provides advice on how to mitigate such threats in our personal and professional lives.
Author
Publisher
MIT Sloan Management Review
Pub. Date
[2022]
Language
English
Description
Ransomware has become a global scourge, as gangs of cybercriminals use malware to encrypt victims' data and extort payment as a condition of restoring access. The majority of business leaders who fall prey to the tactic are unprepared for the scenario and wind up paying the ransom. The authors suggest a more considered approach to that decision and walk readers through six questions that can illuminate their options and inform their choices.
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2023.
Language
English
Description
The business world faces an interesting paradox: although companies spend more money than ever on security solutions and protective technologies, breaches and other attacks continue to escalate. This raises the question: are we, as an industry, doing something wrong? With the increase in targeted cyberattacks, rising risk levels, and high-impact consequences, it's more important than ever to be able to answer that question. In this report, Christopher...
12) The art of cyberwarfare: an investigator's guide to espionage, ransomware, and organized cybercrime
Author
Publisher
No Starch Press Inc
Pub. Date
2022.
Language
English
Description
"This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"-- Provided by publisher.
Author
Publisher
MIT Sloan Management Review
Pub. Date
2022.
Language
English
Description
Lessons and insights from past cyberattacks can help companies prepare and respond more successfully to future threats. The authors conducted in-depth interviews with senior leaders whose companies had previously endured serious cyberattacks to learn from their experiences. In this article, they describe three common mistakes people make that inhibit successful recovery from a cyberattack, as well as three elements at the heart of responding successfully...
Author
Publisher
MIT Sloan Management Review
Pub. Date
2023.
Language
English
Description
Most organizations put more resources toward identification, protection, and detection rather than their ability to respond to and recover from a cyber breach, leaving themselves vulnerable. But because companies can't protect against every new cyberattack, it's critical that they reduce the potential impact by putting more focus on cyber resilience. The authors describe how leaders can apply seven biology-inspired adaptive design principles to become...
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2023
Language
English
Description
Why is it difficult for so many companies to get digital identity right? If you're still wrestling with even simple identity problems like modern website authentication, this practical book has the answers you need. Author Phil Windley provides conceptual frameworks to help you make sense of all the protocols, standards, and solutions available and includes suggestions for where and when you can apply them. By linking current social login solutions...
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Appears on list
Description
This book provides a comprehensive summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government--international, national, state, and local, explaining cybercrime in a highly networked world.
Author
Publisher
Packt Publishing Ltd
Pub. Date
2022.
Language
English
Description
With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business's cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem,...
19) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Language
English
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"-- Provided by publisher
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you...
Author
Publisher
Addison-Wesley Professional
Pub. Date
2021.
Language
English
Description
This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request