Catalog Search Results
2) The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime
Author
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"-- Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You’ve probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Author
Publisher
Bloomsbury
Pub. Date
2015.
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Author
Series
Formats
Description
"Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security...
5) Hackers
Author
Series
Formats
Description
"In tech slang, a hacker may be a person who enjoys exploring the details of programmable systems, a person who likes to spend time and effort solving a problem, an expert or enthusiast, or a malicious meddler who tries to discover sensitive information by poking around."--Provided by publisher.
Author
Series
Publisher
St. Martin's Press
Pub. Date
2024.
Description
"Garrett Sinclair escapes from prison to rescue his team from the manipulations of two tech moguls and learns of a devastating family secret in the process. Influential tech magnate Mitch Drewson calls on Sinclair and the Dagger team to protect his Project Optimus. An ambitious endeavor to empower citizens to protect financial and personal data in the face of increasingly authoritarian federal governments, Project Optimus is a threat to Aurelius Blanc's...
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
2022
Description
"Every organization needs a strong security program. One recent study estimated that a hacker attack occurs somewhere every 37 seconds. Since security programs are only as effective as a team?s willingness to follow their rules and protocols, it?s increasingly necessary to have not just a widely accessible gold standard of security, but also a practical plan for rolling it out and getting others on board with following it. Security Awareness For Dummies...
Author
Formats
Description
"Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly...
12) Digital fortress
Author
Publisher
St. Martin's Press
Pub. Date
c1998
Description
When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant mathematician. What she uncovers sends shock waves throughout the corridors of power. On hearing the National Security Agency has secretly installed a program that can read anyone's e-mail, Ensei Tankado comes up with a program to paralyze it.
13) Zero days
Author
Pub. Date
2023.
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
14) The sentinel
Author
Series
Jack Reacher novel volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the...
Author
Series
Stone Barrington volume 56
Formats
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Series
Description
"Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
Author
Publisher
No Starch Press
Pub. Date
[2021]
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Didn't find it?
Can't find what you are looking for? Request an item not in the catalog. Submit Request