Catalog Search Results
Author
Publisher
Bloomsbury Children's Books
Pub. Date
2019.
Description
"Codes can carry big secrets! Throughout history, lots of good guys and lots of bad guys have used codes to keep their messages under wraps. This fun and flippable nonfiction features stories of hidden treasures, war-time maneuverings, and contemporary hacking as well as explaining the mechanics behind the codes in accessible and kid friendly forms. Sidebars call out activities that invite the reader to try their own hand at cracking and crafting...
Author
Series
Mac B. kid spy volume 4
Formats
Description
"The Queen of England calls on Mac B. once again! This time, Mac must crack a secret code that has been recovered from a double agent. A series of clues leads Mac to France, and then to Japan, where he comes face-to-face with his arch-nemesis, the KGB man... and the world headquarters of Nintendo! Is the KGB Man secretly behind all of this? And are Mac's video game skills good enough to facedown his enemy at the Video Game World Championships?"--Provided...
Author
Series
Mac B. kid spy volume 6
Formats
Description
"The Queen of England calls on her trusty spy, Mac B., once again. This time, Mac must navigate secret tunnels beneath the Berlin Wall in order to retrieve cheat codes from a Soviet scientist. Floppy disk in hand, our hero finds himself trapped in East Germany, stuck between the wall and the Stasi. How will he escape? Well it is 1989, and walls do fall down"
Author
Series
Mac B. kid spy volume 5
Publisher
Orchard Books, an imprint of Scholastic Inc
Pub. Date
2020.
Description
England is in trouble! A priceless violin has been stolen, and there's only one person who can help: Mac B., kid spy. Mac's adventure takes him on a top-secret museum night watch, zip-lining in Italy with his trusty corgi sidekick, and on an undercover mission in the heart of enemy territory. But when he ends up as a captured prisoner, is the mission lost for good?
Author
Series
Mary Russell and Sherlock Holmes volume 18
Formats
Description
"Mary Russell and Sherlock Holmes, hoping for a respite in the French countryside, are instead caught up in a case that turns both bewildering and intensely personal. After their recent adventures in Transylvania, Russell and Holmes look forward to spending time with Holmes' son, the famous artist Damian Adler, and his family. But when they arrive at Damian's house, they discover that the Adlers have fled from a mysterious threat. Holmes rushes after...
Author
Publisher
Hachette Books
Pub. Date
2017
Description
Recruited by the U.S. Army and Navy from small towns and elite colleges, more than ten thousand women served as codebreakers during World War II. While their brothers and boyfriends took up arms, these women moved to Washington and learned the meticulous work of code-breaking. Their efforts shortened the war, saved countless lives, and gave them access to careers previously denied to them.
Author
Description
Viren, Würmer, Trojanische Pferde, das Arsenal der Hackerangriffe auf IT-Infrastrukturen scheint unerschöpflich. Nachdem Computerwurm Stuxnet 2010 das Steuerungssystem eines iranischen Atomkraftwerks befallen hatte und Computer durch die Malware Flame ferngesteuert und ausspioniert wurden, sorgte 2015 ein Virus namens Duqu 2.0 für Schlagzeilen, weil er die IT von Unternehmen in Europa, Asien und den USA infiziert hatte. Was aber wenn Computer grundsätzlich...
Author
Series
Description
In this book, Dejan Kosutic, author and experienced information security consultant, is giving away his practical know-how on ISO 27001 security controls. No matter if you are new or experienced in the field, this book teaches you everything you need to know about security controls.
ISO 27001 Annex A Controls in Plain English is written primarily for beginners to ISO 27001, and for people with moderate knowledge about Annex A of the standard and...
Author
Series
Description
"Risk management is the central idea of ISO 27001. And, the way ISO 27001 tells you to achieve this tailor-made suit is to perform risk assessment and risk treatment." This book, ISO 27001 Risk Management in Plain English, is a quick read for people who are focused solely on risk management. It has one aim in mind: to give you the knowledge and practical step-by-step process you need to successfully implement ISO 27001 risk assessment and treatment...
Author
Description
It seems like everywhere you go on the Internet, there is spam, spyware, and the risk of viruses infecting your computer and ruining your online experience. In businesses alone, according to Nucleus Research Inc. spam costs more than $712 per employee each year in productivity and computing resources and the estimation on money lost by businesses due to computer viruses ranges between $100 million and $2 billion annually depending on how the total...
Author
Series
Codebreakers volume 3
Formats
Description
"Zivon Marin was one of Russia's top cryptographers until the October Revolution tore apart his world. Forced to flee to England after speaking out against Lenin, Zivon is driven by a growing anger and determined to offer his services to the Brits. But never far from his mind is his brother, whom Zivon fears died in the train crash that separated them. Lily Blackwell sees the world best through the lens of a camera and possesses unsurpassed skill...
Author
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Description
Learn how real-life hackers and pentesters break into systems.
Book Description
Discover the essential tools and insights to safeguard your digital assets with the "Ultimate Pentesting for Web Applications". This essential resource comprehensively covers ethical hacking fundamentals to advanced testing methodologies, making it a one-stop resource for web application security knowledge.
Delve into the intricacies of security testing in web applications,...
Author
Series
Description
Bei der heutigen Datenflut, die auf Speichermedien und im Internet kursiert, ist die Kompression digitaler Daten nach wie vor ein immens wichtiger Aspekt bei Datenübertragung und -speicherung. Dieses essential erläutert ohne theoretischen Überbau und mit elementaren mathematischen und informatischen Methoden die wichtigsten Kompressionsverfahren, so unter anderem die Entropiecodierungen von Shannon-Fano und von Huffman, sowie die Wörterbuchcodierungen...
Author
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Description
Learn how real-life hackers and pentesters break into systems.
Key Features
● Dive deep into hands-on methodologies designed to fortify web security and penetration testing.
● Gain invaluable insights from real-world case studies that bridge theory with practice.
● Leverage the latest tools, frameworks, and methodologies to adapt to evolving cybersecurity landscapes and maintain robust web security posture.
Book Description
Discover...
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request