Catalog Search Results
Showing Results using Keyword index
Do you want to be sure your next purchase is reliable? Consumer Reports shares independent and unbiased ratings and reviews for 9000+ products and services. Click here to access Consumer Reports.
Author
Series
Language
English
Formats
Description
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
- The who and why of cybersecurity threats
- Basic cybersecurity concepts
- What to do to be cyber-secure
-...
Author
Language
English
Formats
Description
Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more...
Author
Pub. Date
2022
Language
English
Formats
Description
The reach of Corporations into our lives via cards and apps has never been greater; many of us rarely use cash these days. But what we're told is a natural and inevitable move is actually the work of powerful interests. And the great battle of our time is the battle for ownership of the digital footprints that make up our lives. In Cloudmoney, Brett Scott tells an urgent and revelatory story about how the fusion of Big Finance and Big Tech requires...
Author
Language
English
Formats
Description
The previously untold-and previously highly classified-story of the conflux of espionage and technology, a compelling narrative rich with astonishing revelations taking readers from World War II to the Internet age. As the digital era becomes increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative...
Author
Pub. Date
2021.
Language
English
Formats
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Author
Series
Language
English
Formats
Description
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.
Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into...
Author
Language
English
Formats
Description
"The world of hackers is complex. Some hackers are hired to protect private information. There are also hackers who love to cause chaos. Still, the realm of hackers isn't just black and white. There is a world of gray, too. Develop your expertise with expressions as you explore the secret lives of these computer-programming experts"--
Author
Series
Language
English
Description
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the...
Author
Series
Language
English
Formats
Description
Learn all about the famous social-networking site Facebook with projects inspired by its features and functions. Create profile posters for famous people from the past, write status updates from your pet's perspective, and invent your own emoticons. Step-by-step directions and colorful photos bring each project to life. -- Publisher description.
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Series
Language
English
Formats
Description
From New York Times bestselling author James Rollins comes a lightning-paced short story, in which a major attack on U.S. soil can only be stopped by ... The Midnight Watch In the dead of night, a faceless enemy hacks into the Smithsonian Institution's network of servers, but it is only the first strike masking a larger attack. To rescue a biologist trapped in the National Museum of Natural History and to discover the true intent behind an assault...
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Author
Language
English
Formats
Description
"In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance...
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
19) The cybersecurity playbook: how every leader and employee can contribute to a culture of security
Author
Language
English
Formats
Description
"Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next...
Interlibrary Loan
Didn't find what you need? Items not owned by Main Library Alliance members might be available in other libraries across New Jersey. You can search JerseyCat and place a request for the item to be sent to your library.
If your library doesn't permit JerseyCat requests or the item can't be found, you can also contact your library for assistance.Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request