Catalog Search Results
Author
Language
English
Description
How Not to Get Phished equips you with the knowledge and tools to:
42) Seizure
Author
Series
Pub. Date
2011
Accelerated Reader
IL: MG+ - BL: 3.5 - AR Pts: 12
Language
English
Formats
Description
Ever since Tory Brennan and her friends rescued Cooper, a kidnapped wolf pup with a rare strain of canine parvovirus, they've turned from regular kids into a crime-solving pack! But now the very place that brought them together - the Loggerhead Island Research Institute - is out of funding and will have to shut down. That is, unless the Virals can figure out a way to save it!
Author
Series
Publisher
Sky Pony Press
Pub. Date
[2015]
Accelerated Reader
IL: MG - BL: 5.8 - AR Pts: 10
Physical Desc
282 pages ; 21 cm
Language
English
Description
Herobrine, the artificially intelligent virus intent on infecting the Internet with evil, attacks Crafter, the most sensitive NPC on the server, and Gameknight must journey to The End to destroy Herobrine and his villainous creations.
Author
Language
English
Formats
Description
"Fifteen-year-old Dany is trying to survive with her little sister, Mac, in a world collapsing under the weight of a slow, creeping virus that erodes memory. As their identities slip away from them, the late-stage infected are quarantined by the Ministry of Disease Control in prison-hospices, military camps where some of Dany's family have already been taken. When a new and more virulent strain of the disease emerges and Dany begins to experience...
Author
Language
English
Description
HACKING
With growing digital dependence and an increase in cyber threats, you cannot afford to be in the dark as far as your digital and online security is concerned. This book is a simple guide that will reveal the many potential risks and mistakes that can expose you to hackers.
This is a book for anyone and everyone. If you use a mobile phone, computer, or any other digital device, then this book will serve as your complete guide...
Publisher
Anchor Bay Entertainment
Pub. Date
[2015]
Physical Desc
5 videodiscs (710 min.) : sound, color ; 4 3/4 in.
Language
English
Description
The group crosses paths with a mysterious priest and takes shelter in his church. As Daryl and Carol follow a lead to the whereabouts of Beth, the others begin to realize that they're being hunted. As Bob's life hangs in the balance, the group prepares to face off against the cannibalistic hunters of Terminus.
Author
Series
Accelerated Reader
IL: LG - BL: 3.5 - AR Pts: 1
Language
English
Formats
Description
"When a new virus separates her family and her Grandmommy can no longer go out to work, Tola goes instead and works for the Diamond family where she makes new friends among the household staff and discovers that the wealthy have problems, too"--
51) Snot, sneezes, and super-spreaders: everything you need to know about viruses and how to stop them
Author
Language
English
Formats
Description
"f we didn't know it before, we certainly know it now: Viruses can be powerful-so powerful, in fact, that they can hold the world in their grip for months at a time. But what exactly is a virus? Where do they come from and what do they do to our bodies? How do they spread, and what can we do to protect ourselves? Author Marc ter Horst tackles these questions with playfulness and humor, while Wendy Panders' quirky and enlightening illustrations bring...
Author
Language
Español
Description
Originalmente, el término "hacker" se refería a un programador experto en sistemas operativos de computadoras y código de máquina. Hoy, se refiere a cualquiera que realice actividades de piratería o piratería. La piratería es el acto de cambiar las características de un sistema para lograr un objetivo que no está dentro del propósito original del creador. La palabra "piratería" generalmente se percibe negativamente, especialmente por personas...
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Language
English
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Series
Language
English
Description
This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors...
Author
Series
Language
English
Description
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.
Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.
We...
Author
Language
English
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
Author
Language
English
Description
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones, protected with ironclad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your...
In Interlibrary Loan
Didn't find what you need? Items not owned by Pueblo Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request