Catalog Search Results
Author
Language
English
Formats
Description
Up-to-date strategies for thwarting the latest, most insidious network attacks. This fully updated, industry-standard security resource shows, step by step, how to fortify computer networks by learning and applying effective ethical hacking techniques. Based on curricula developed by the authors at major security conferences and colleges, the book features actionable planning and analysis methods as well as practical steps for identifying and combating...
Author
Publisher
O'Reilly Media
Language
English
Formats
Description
"Agile continues to be the most adopted software development methodology among organizations worldwide, but it generally hasn't integrated well with traditional security management techniques. And most security professionals aren't up to speed in their understanding and experience of agile development. To help bridge the divide between these two worlds, this practical guide introduces several security tools and techniques adapted specifically to integrate...
Author
Publisher
No Starch Press, Inc
Language
English
Formats
Description
"Teaches how to use C#'s set of core libraries to automate tasks like performing vulnerability scans, malware analysis, and incident response. Teaches how to write practical security tools that will run on Mac, Linux, and mobile devices"--
Author
Publisher
John Wiley & Sons, Inc
Language
English
Appears on list
Formats
Description
In "Navigating the Cybersecurity Career Path", decorated Chief Information Security Officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
Author
Publisher
Greenleaf Book Group Press
Pub. Date
[2020]
Language
English
Description
Well Aware offers a timely take on the leadership issues that businesses face when it comes to the threat of hacking. Finney argues that cybersecurity is not a technology problem; it's a people problem. Cybersecurity should be understood as a series of nine habits that should be mastered literacy, skepticism, vigilance, secrecy, culture, diligence, community, mirroring, and deception drawn from knowledge the author has acquired during two decades...
Author
Publisher
Apress
Language
English
Formats
Description
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual...
Author
Pub. Date
[2018]
Language
English
Appears on list
Formats
Description
"Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher.
10) Hacking
Author
Series
Publisher
John Wiley & Sons, Inc
Language
English
Formats
Description
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes...
11) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Language
English
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Author
Series
Publisher
Simon & Schuster
Pub. Date
2019.
Language
English
Description
"It's impossible to ignore the critical role cybersecurity plays within our society, politics, and the global order. In Becoming an Ethical Hacker, investigative reporter Gary Rivlin offers an easy-to-digest primer on what white hat hacking is, how it began, and where it's going, while providing vivid case studies illustrating how to become one of these "white hats" who specializes in ensuring the security of an organization's information systems....
Author
Publisher
Rowman & Littlefield
Pub. Date
[2016]
Language
English
Appears on list
Description
Examines the ongoing cybersecurity attacks on government and business sites in the United States and describes the internal power struggles within the Obama administration, Congress, and the business community to contain and prevent them.
Author
Publisher
No Starch Press
Language
English
Formats
Description
Step into the shoes of a master hacker and break into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real life weaknesses in today's advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments...
Author
Publisher
Bloomsbury
Pub. Date
©2015.
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Author
Publisher
No Starch Press
Pub. Date
[2018]
Language
English
Formats
Description
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization. Security has become a "big data" problem. The growth rate of malware has accelerated to tens of millions of new files per year while our networks generate an ever-larger flood of security-relevant data each day. In order to defend against these advanced attacks, you'll need to know how to think like a data scientist....
Author
Publisher
O'Reilly Media
Pub. Date
2016.
Language
English
Appears on list
Formats
Description
"The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware can infect your system and what steps you can take to stop the attack before it sets foot in your network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks has spawned not only...
Author
Pub. Date
2019.
Language
English
Formats
Description
"This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien"--
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition...
Author
Pub. Date
2022.
Language
English
Formats
Description
Don't Let the Real Test Be Your First Test! Fully updated for the CEH v11 exam objectives, this practical guide contains more than 550 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. Designed to help you pass the exam, this is the perfect companion to CEH"!Certified...
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request