Catalog Search Results
Author
Publisher
Apress
Language
English
Formats
Description
Personal Cybersecurity addresses the needs of individual users at work and at home. This book covers personal cybersecurity for all modes of personal computing whether on consumer-acquired or company-issued devices: desktop PCs, laptops, mobile devices, smart TVs, WiFi and Bluetooth peripherals, and IoT objects embedded with network-connected sensors. In all these modes, the frequency, intensity, and sophistication of cyberattacks that put individual...
Author
Language
English
Formats
Description
Reimagine the future of the internet All our devices and gadgets from our refrigerators to our home security systems, vacuum cleaners, and stereos are going online, just like our computers did. But once we ve successfully connected our devices to the internet, do we have any hope of keeping them, and ourselves, safe from the dangers that lurk beneath the digital waters? In If It s Smart, It s Vulnerable, veteran cybersecurity professional Mikko Hypponen...
Author
Publisher
DK Publishing
Pub. Date
2018.
Language
English
Description
"This practical go-to guide highlights all the risks kids face when they chat online, share selfies, use apps, and explore the Internet. International security expert Will Geddes answers difficult questions from worried parents and gives simple action plans, preventative steps, and advice on how to recognize the warning signs"--Back cover.
Author
Publisher
Little, Brown and Company
Pub. Date
2017.
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Appears on list
Description
This book provides a comprehensive summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government--international, national, state, and local, explaining cybercrime in a highly networked world.
Author
Publisher
O'Reilly Media
Pub. Date
[2018]
Language
English
Description
Distributed Denial of Service (DDoS) attacks have existed for almost as long as the commercial web itself, and they remain one of the most effective ways to disrupt online services. But, since many of these attacks go undisclosed, industry collaboration on ways to combat them has been slow to emerge. This ebook provides engineers and IT managers with techniques for detecting and mitigating ongoing and potential DDoS events. Authors Rich Groves and...
Author
Publisher
Packt Publishing Ltd
Pub. Date
2022
Language
English
Description
Dive into privacy, security, and online anonymity to safeguard your identity Key Features Leverage anonymity to completely disappear from the public view Be a ghost on the web, use the web without leaving a trace, and master the art of invisibility Become proactive to safeguard your privacy while using the web Book Description As the world becomes more connected through the web, new data collection innovations have opened up more ways to compromise...
Author
Publisher
IT Governance Publishing
Pub. Date
2022.
Language
English
Description
This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2022.
Language
English
Description
Cybersecurity experts are overwhelmed, constantly on guard against malicious activity on their networks. Further complicating these external assaults are internal risks arising from simple errors, disgruntled employees, and outdated software configurations. Security experts today must act on the assumption that all applications, services, identities, and networks are under threat. This report examines how security data lakes can complement or replace...
Author
Publisher
Packt Publishing
Pub. Date
2020.
Language
English
Description
With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Featuring contributions from cybersecurity CEOs, military generals, and industry leaders, Cyber Minds acts as a strategic briefing on cybersecurity and data safety.
Series
Publisher
IBM
Pub. Date
2022.
Language
English
Description
The focus of this Blueprint publication is to highlight the early threat detection capabilities of IBM® QRadar® and to show how to proactively start a cyber-resilience workflow in response to a cyberattack or malicious user actions. The workflow uses IBM's Copy Services Manager as orchestration software to start IBM Spectrum Virtualize for Public Cloud (SV4PC) Safeguarded Copy functions. The IBM SV4PC Safeguarded Copy function creates an immutable...
Author
Publisher
W.W. Norton & Company
Pub. Date
[2018]
Language
English
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
16) Cybersecurity
Author
Publisher
The MIT Press
Pub. Date
[2021]
Language
English
Description
"An introduction to the major concepts in cybersecurity that includes case examples and tips for individuals to protect themselves"--
Author
Series
Publisher
Oxford University Press
Pub. Date
[2020]
Language
English
Description
"Many of us go about our daily lives completely-some might say blissfully-unaware that we are surrounded by a cornucopia of devices that are running on various connected platforms and recording our physical presence, voices, heartbeats, and preferences. Have a look around you. Beyond your computer, tablet, or smartphone, how many 'things' that you see are connected to the Internet, either directly or indirectly? Are you wearing a Fitbit or an Apple...
Author
Publisher
John Wiley & Sons
Pub. Date
[2017]
Language
English
Description
Includes essential background information of technologies that work as building blocks for the security of the current wireless systems and solutions, this book describes many novelty and expected future development options and discusses respective security aspects and protection methods. --
Author
Publisher
O'Reilly Media
Pub. Date
[2018]
Language
English
Description
Firewalls have traditionally focused on network traffic, but with the advent of cloud computing and DevOps, security and operations professionals need a more sophisticated solution to track session state and application layer activity. In this ebook, cyber security consultant Chad Russell covers the current application threat landscape for modern deployment architectures, and explains the evolution of web application firewall (WAF) technologies for...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request