Catalog Search Results
1) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
"Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Author
Language
English
Description
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems...
Author
Publisher
Wiley
Language
English
Formats
Description
Defending your web applications against hackers and attackers The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware...
Author
Series
Language
English
Formats
Description
"Go behind the scenes and be mentored by the best in the business to find out what it's really like, and what it really takes, to become an ethical hacker. Think like a hacker. The march of technology has created enormous demand for cybersecurity specialists who protect our systems and battle those with bad intentions. Ethical hacking is an expansive ecosystem of professionals who defend our apps, data, devices, and networks against cyberattacks....
Author
Language
English
Formats
Description
An accessible introduction to cybersecurity concepts and practices
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires
...Author
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Series
Language
English
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
Author
Language
English
Formats
Description
The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming each one more pernicious than the last from China, Russia, Iran, North Korea, the Middle East, and points...
12) The Phalanx code
Author
Series
Garrett Sinclair novels volume 3
Pub. Date
2024.
Language
English
Formats
Description
"Garrett Sinclair escapes from prison to rescue his team from the manipulations of two tech moguls and learns of a devastating family secret in the process. Influential tech magnate Mitch Drewson calls on Sinclair and the Dagger team to protect his Project Optimus. An ambitious endeavor to empower citizens to protect financial and personal data in the face of increasingly authoritarian federal governments, Project Optimus is a threat to Aurelius Blanc's...
Author
Language
English
Formats
Description
Axiom Business Book Award Silver Medalist in Business TechnologyThe indispensable guide to data-powered marketing from the team behind the data management platform that helps fuel Salesforce―the #1 customer relationship management (CRM) company in the worldA tectonic shift in the practice of marketing is underway. Digital technology, social media, and e-commerce have radically changed the way consumers access information, order...
15) Not with a bug, but with a sticker: attacks on machine learning systems and what to do about them
Author
Language
English
Formats
Description
In Not With A Bug, But With A Sticker: Attacks on Machine Learning Systems and What To Do About Them, a team of distinguished adversarial machine learning researchers deliver a riveting account of the most significant risk to currently deployed artificial intelligence systems: cybersecurity threats. The authors take you on a sweeping tour - from inside secretive government organizations to academic workshops at ski chalets to Google's cafeteria -...
Author
Language
English
Formats
Description
Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include the latest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services...
Author
Publisher
Titan
Pub. Date
2017.
Language
English
Formats
Description
Based on the internationally-acclaimed sci-fi property, "GHOST IN THE SHELL" follows the Major, a special ops one-of-a-kind human-cyborg hybrid, who leads the elite task force Section 9. Devoted to stopping the most dangerous criminals and extremists, Section 9 is faced with an enemy whose singular goal is to wipe out Hanka Robotic's advancements in cyber technology.
18) Threat Point
Author
Series
Language
English
Description
A mysterious AI-controlled sub in the Black Sea, a sleeper agent in the Pacific and a gang of master international hackers threaten to throw the United States into chaos. America may seem safe from within. But far beyond its borders, a new enemy is rising: a global organization that aims to destroy the country's cybersecurity and wreak havoc on the nation. The president has tasked the new intelligence agency, Net Force, with sniffing out and putting...
19) The spy and I
Author
Series
My spy volume 1
Pub. Date
2024.
Language
English
Description
"Right place. Wrong person. After a case of mistaken identity, one woman must work with her sister's sexy spy partner to save the world in this heart-pounding romantic comedy. The first thing to know about Dove Barkley is that, even though she works as a cyber security analyst, she is one hundred percent not an undercover CIA operative. But when a group of bad guys mistake her for her super-spy sister (news to her!), Dove gets roped into a dangerous...
20) Falcon
Author
Series
Quiet professionals volume 3
Pub. Date
2015
Language
English
Formats
Description
Special Forces operator Salvatore "Falcon" Russo vowed to never again speak to or trust Lieutenant Cassandra Walker after a tragedy four years ago. But as Raptor closes in on the cyber terrorists responsible for killing two of their own, Sal must put his life-- and the lives of his teammates-- in her hands. Cassie is ill-prepared for Falcon's resistance and the fallout. As allies become enemies and hostiles become unlikely partners, Raptor fights...