Catalog Search Results
Author
Language
English
Description
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...
2) Thirst
Author
Accelerated Reader
IL: MG - BL: 4.4 - AR Pts: 5
Language
English
Description
"A heroic girl in Mumbai fights for her belief that water should be for everyone"--
Author
Language
English
Description
"A nuts-and-bolts explainer book that explores what cryptography does, how it keeps us secure in cyberspace, and why it is so controversial. Though we may not see it, cryptography plays a critical role in our everyday lives, from the movies we stream and our Google searches to even opening our car doors with electronic key fobs. Broadly defined as a set of tools for establishing the basic elements of security in cyberspace, cryptography enables us...
Author
Series
Language
English
Description
Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation's sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture,...
5) Zero days
Author
Pub. Date
2023.
Language
English
Appears on list
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Description
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This eBook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include- using personal mobile devices at work (BYOD), password security, data encryption, raising user awareness, securing networks, legal aspects of...
Author
Language
English
Description
Welcome to "Navigating the Dark Waters of Cybersecurity Incident Response," a comprehensive guide that will help you prepare for and respond to cyber attacks. Written by a team of experienced cybersecurity experts, this book provides practical advice, real-world examples, and actionable insights that will help you navigate the complex and often murky world of cybersecurity incident response.
"Navigating the Dark Waters" offers a step-by-step approach...
Author
Language
English
Description
I am in cybersecurity, but I am not a hacker! This field has many branches and not all of them are deeply technical or hands on. Some of these jobs are high-paying with salaries up to 6 figures.
According to the White House, there are 700,000 cybersecurity positions open today. There is a good chance that you fit into some of these roles.
Using the techniques in this series, you can be a part of one of the fastest, highest paid career paths in IT....
Author
Series
Language
English
Description
Raisa Rae Jordan, an agent for the U.S. Diplomatic Security Service, isn't in Israel for more than a day before her predecessor is gunned down Tel Aviv square by a sniper. Assigned to investigate the assassination of one of her own, she must also protect Judge Ben Taylor and his teenage daughter. They may be the sniper's next target and are most certainly being threatened by a desperate cadre of terrorists with their sights set on the Secretary of...
11) Private Berlin
Author
Series
Accelerated Reader
IL: UG - BL: 5.2 - AR Pts: 11
Language
English
Description
The Berlin office of the world's most renowned investigation firm looks into the disappearance of an agent, Chris Schneider, whose last case involved an unfaithful billionaire, a cheating soccer player and a seedy nightclub owner.
Author
Language
English
Description
Your one-stop guide to learning and implementing Red Team tactics effectively
Key Features:
- Target a complex enterprise environment in a Red Team activity
- Detect threats and respond to them with a real-world cyber-attack simulation
- Explore advanced penetration testing tools and techniques
Book Description:
Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities....
13) Python pour les hackers : Le guide des script kiddies : apprenez à créer vos propres outils de hacki
Author
Language
Français
Description
Voulez-vous faire partie d'une communauté de hackers et acquérir une compétence d'un vrai hacker? Vous n'aimez pas qu'on vous traite de script kiddie, alors que vous vous considérez comme hacker? Moi non plus. Mais il y a une vérité qu'il ne faut pas ignorer... Voici mon histoire :Quand j'ai commencé à apprendre le hacking (il y a quelques années de cela), j'ai fait ce que fait tout débutant : installer Kali Linux (backtrack à l'époque)...
Author
Language
English
Formats
Description
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!
Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your comprehensive guide to mastering the art of cyber defense and infrastructure security.
���� BOOK 1 - CYBERWATCH: A BEGINNER'S GUIDE TO DIGITAL SECURITY: Get started on your cybersecurity journey...
Author
Language
English
Appears on list
Description
"A deeply reported, newsbreaking account the humanitarian crisis of our time by the journalist who has been at the center of the story: MSNBC correspondent Jacob Soboroff, winner of the 2019 Walter Cronkite Award, offers a chilling expose of the human cost of the Trump administration's border and immigration policies"--
Author
Language
English
Formats
Description
Explore and use the latest VAPT approaches and methodologies to perform comprehensive and effective security assessments KEY FEATURES ● A comprehensive guide to vulnerability assessment and penetration testing (VAPT) for all areas of cybersecurity.● Learn everything you need to know about VAPT, from planning and governance to the PPT framework.● Develop the skills you need to perform VAPT effectively and protect your organization from cyberattacks....
Author
Language
English
Description
You can hack is the book which tells you the step-by-step hacking tutorials with screenshot. This book is, written in simple language, which can be easily understand by anyone. This book is best for beginners to start career in hacking. you can hack is written in different way in many books you found lot of theory and concepts and after reading many pages you understand a single step of hacking but here is totally different. In you can hack all the...
Author
Language
English
Description
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone-not just techies-to become informed and empowered on the subject of cybersecurity.
In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such...
Author
Language
English
Description
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a programmatic approach to understand Java EE and GlassFish security.
You will find plenty of code samples in this book. It is easy to secure your application when you have a demonstration of a complete and working application explained in the book, isn't it? Each chapter starts with the importance and...
Author
Series
Language
English
Description
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed...
In Interlibrary Loan
Didn't find what you need? Items not owned by Pueblo Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request