Catalog Search Results
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, 35 min.) : digital, stereo., sound, color
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Language
English
Formats
Description
Prepare for the CompTIA CySA+ certification exam with the official and updated study guide for Exam CS0-003 In the newly revised third edition of CompTIA CySA+ Study Guide: Exam CS0-003, a team of leading security experts and tech educators delivers comprehensive and accurate coverage of every topic and domain covered on the certification exam. You'll find clear and concise information on critical security topics presented by way of practical, real-world...
Author
Publisher
[Division of Transportation Planning, Colorado Dept. of Transportation]
Pub. Date
[2008]
Physical Desc
1 online resource (67 p.) : ill., maps.
Language
English
Description
This document describes the transportation planning process in Colorado, describes CDOT's approach to addressing security as a planning factor for its 2035 Statewide Plan, describes the roles of known and contacted agencies responsible for security planning, and documents the events of the Security Workshop hosted by CDOT.
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 27 min., 57 sec.) : digital, .flv file, sound
Language
English
Description
This program will show you recommended ways of handling difficult situations that your library and staff may encounter. Among the issues covered are potentially violent patrons, bomb threats, sexual harassment, and inappropriate Internet browsing. "Highly recommended ..." - Video Librarian.
Author
Language
English
Formats
Description
Everyone is affected by credit card fraud, if they are aware of it or not. Every day there are a variety of ways that scams and fraudsters can get your card and personal information. Today so much business occurs over the Internet or via the phone where no card is present. What can start as a seemingly legitimate purchase can easily turn into fraudulent charges — or worse, sometimes a physical confrontation, when a criminal steals a credit card...
Author
Language
English
Formats
Description
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times bestselling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of twenty-first-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and...
11) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Publisher
Penguin Press
Pub. Date
2019.
Physical Desc
344 pages ; 25 cm
Language
English
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 22 min.) : digital, .flv file, sound
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 33 min.) : digital, .flv file, sound
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Language
English
Formats
Description
The New York Times bestselling author of Shadow Warriors investigates the tragedy of Benghazi to answer the questions: what really happened—and why?
We know the Obama administration’s story, of a demonstration caused by an Internet movie that went out of control. But what actually did happen in Benghazi on the night of September 11, 2012?
Dark Forces is the story of clandestine arms deliveries by the
...Author
Language
English
Formats
Description
The explosive inside account of the attack against the U.S. diplomatic and intelligence outposts in Benghazi, Libya On the night of September 11, 2012, the American diplomatic mission at Benghazi, Libya, came under ferocious attack by a heavily armed group of Islamic terrorists. The prolonged firefight, and the attack hours later on a nearby CIA outpost, resulted in the deaths of four Americans, including the American ambassador to Libya, Christopher...
Author
Language
English
Formats
Description
"Disruption tells the story of the conspiracy to simultaneously destroy several passenger jets over the Atlantic Ocean in 2006 and the desperate efforts by the British, Americans, and Pakistanis to crush the conspiracy before the bombs went off in the largest counterterrorism investigation in history"--
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, 20 min. 15 sec.) : digital, stereo., sound, color
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Pub. Date
2023.
Language
English
Formats
Description
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by...
In Interlibrary Loan
Didn't find what you need? Items not owned by Pueblo Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request