Catalog Search Results
Author
Language
English
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Series
Mortality doctrine volume 3
Language
English
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
Author
Pub. Date
2018.
Language
English
Description
"Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Mortality doctrine volume 1
Language
English
Description
"Michael is a skilled Internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--
Author
Series
Mortality doctrine volume 2
Language
English
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
7) Skinner
Author
Pub. Date
2013.
Language
English
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to the hinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile. His asset is Jae, a roboticist with a gift for seeing the underlying...
Author
Publisher
MIT Sloan Management Review
Pub. Date
2022.
Language
English
Description
When cyberattackers succeed, semiconscious decision-making - seemingly isolated decisions the target company made without fully considering the possible consequences - is often to blame. The Cybersecurity at MIT Sloan (CAMS) team has developed and applied the Cybersafety methodology to analyze successful cyberattacks - and prevent others. CAMS's founding director describes how a Cybersafety analysis of the 2017 Equifax data breach revealed multiple...
Author
Series
Publisher
Packt Publishing Ltd
Pub. Date
[2023]
Language
English
Description
Tim Rains is Microsoft's former Global Chief Security Advisor and Amazon Web Services' former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies. Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals...
Author
Publisher
Packt
Pub. Date
2020
Language
English
Description
It is challenging for an organization to estimate the effectiveness of a cybersecurity strategy. Cybersecurity Threats, Malware Trends, and Strategies acts as a comprehensive guide to cybersecurity based on thousands of cybersecurity discussions and threat intelligence briefings that the author has participated in over a two-decade career.
11) After the flare
Author
Series
Nigerians in space volume 2
Publisher
The Unnamed Press
Pub. Date
2017.
Language
English
Description
A catastrophic solar flare reshapes our world order as we know it - in an instant, electricity grids are crippled, followed by devastating cyberattacks that paralyze all communication. With America in chaos, former NASA employee Kwesi Bracket works at the only functioning space program in the world, which just happens to be in Nigeria. With Europe, Asia, and the U.S. knocked off-line, and thousands of dead satellites about to plummet to Earth, the...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
13) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Publisher
Apress
Pub. Date
[2022]
Language
English
Description
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus--it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years,...
Author
Language
English
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Author
Publisher
John Wiley & Sons, Inc
Pub. Date
[2023]
Language
English
Description
"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request