Catalog Search Results
Showing Results using Keyword index
4) The cipher
Author
Publisher
Viking Juvenile
Pub. Date
©2015.
Language
English
Description
"Robert 'Smiles' Smylie and his friend Ben become embroiled in a high-stakes negotiation with a pair of suspicious Feds when Ben cracks a code with the power to unlock all the Internet's secrets"--
Author
Publisher
Rowman & Littlefield
Pub. Date
[2020]
Language
English
Description
"Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow's attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake"...
Author
Publisher
IT Governance Publishing
Pub. Date
2022.
Language
English
Description
This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
Author
Publisher
Packt Publishing Ltd
Pub. Date
2022
Language
English
Description
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book Description As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise...
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2022.
Language
English
Description
Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the assumption that all applications, services, identities, and networks are under threat. This report examines how security data lakes can complement or replace...
Author
Publisher
John Wiley & Sons
Pub. Date
[2017]
Language
English
Description
Includes essential background information of technologies that work as building blocks for the security of the current wireless systems and solutions, this book describes many novelty and expected future development options and discusses respective security aspects and protection methods. --
Author
Publisher
Pearson IT Certification
Pub. Date
[2019]
Language
English
Description
This lab manual accompanies the textbook Linux Essentials for Cybersecurity, which teaches people how to use Linux systems and ensures that the Linux systems they work on are as secure as possible. To really become a Linux cybersecurity expert, you need practice. In this book, there are three different types of labs to practice your skills: Labs in which you are presented with a short problem that requires only a single operation to complete. Labs...
Author
Publisher
Apress
Language
English
Formats
Description
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual...
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Appears on list
Description
This book provides a comprehensive summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government--international, national, state, and local, explaining cybercrime in a highly networked world.
Author
Publisher
O'Reilly Media
Pub. Date
[2018]
Language
English
Description
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern deployment architectures, and explains the evolution of web application firewall (WAF) technologies for...
Author
Publisher
Little, Brown and Company
Pub. Date
2017.
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Publisher
Packt Publishing
Pub. Date
2020.
Language
English
Description
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety.
Series
Publisher
IBM
Pub. Date
2022.
Language
English
Description
The focus of this Blueprint publication is to highlight the early threat detection capabilities of IBM® QRadar® and to show how to proactively start a cyber-resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM's Copy Services Manager as orchestration software to start IBM Spectrum Virtualize for Public Cloud (SV4PC) Safeguarded Copy functions. The IBM SV4PC Safeguarded Copy function creates an immutable...
Author
Publisher
O'Reilly Media
Pub. Date
[2018]
Language
English
Description
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to combat them has been slow to emerge. This ebook provides engineers and IT managers with techniques for detecting and mitigating ongoing and potential DDoS events. Authors Rich Groves and...
Author
Publisher
W.W. Norton & Company
Pub. Date
[2018]
Language
English
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request