Catalog Search Results
Author
Series
The circle volume 1
Formats
Description
An Adrenaline-Laced Epic Where Dreams and Reality Collide. Fleeing assailants through deserted alleyways, Thomas Hunter narrowly escapes to the roof of a building. Then a silent bullet from the night clips his head . . . and his world goes black. From the blackness comes an amazing reality of another world where evil is contained. A world where Thomas Hunter is in love with a beautiful woman. But then he remembers the dream of being chased through...
Author
Series
The wmd files volume 2
Description
"With The Pandora Deception, Bruns and Olson return with a captivating portrayal of modern day combat that "compares with the best of the timeless classics by Tom Clancy, Dale Brown, and Stephen Coonts." (Mark Greaney) To effectively combat the rise of global terrorism, the U.S. military must now rely on more than traditional weapons and tactics. Don Riley of the U.S. Cyber Command is given charge of a brand new effort: a new team in the CIA Operations...
Author
Description
Los cambios tecnológicos del último siglo han generado un nuevo y disruptivo dominio —el ciberespacio—, el cual no solo está modificando la vida a nivel individual de las personas, sino también a nivel macro. Por ello, hoy los organismos responsables de la defensa en distintas partes del mundo, han debido rearticular sus procedimientos y prioridades, al tener que asumir, además de la protección de los dominios tradicionales de tierra, mar...
Author
Description
There is a town that has two types of people, those that only have green hair and those that only have red hair. Why the Greenheads only have green hair and why the Redheads only have red hair is no mystery. It's no mystery why their hair keeps changing, but it's definitely a problem! Conflict erupts in the town as the two groups push each other to the limits. It is the bravery and wisdom of two children that lead the town to an amazing and healing...
5) The dark net
Author
Formats
Description
"The dark net is real. An anonymous and often criminal arena that exists in the secret, far reaches of the Web, some use it to manage Bitcoins, pirate movies and music, or traffic in drugs and stolen goods. And now, an ancient darkness is gathering there as well. These demons are threatening to spread virally into the real world, unless they can be stopped by members of a ragtag crew: Twelve-year-old Hannah, who has been fitted with the Oculus, a...
Author
Formats
Description
"In the wake of a highly contagious virus, California is under quarantine. Sequestered in high rise towers, the living can't go out, but the dead can come in--and they come in all forms, from sad rolling cans to manufactured bodies that can pass for human. Wealthy participants in the 'companionship' program choose to upload their consciousness before dying, so they can stay in the custody of their families. The less fortunate are rented out to strangers...
Author
Description
HACKING
With growing digital dependence and an increase in cyber threats, you cannot afford to be in the dark as far as your digital and online security is concerned. This book is a simple guide that will reveal the many potential risks and mistakes that can expose you to hackers.
This is a book for anyone and everyone. If you use a mobile phone, computer, or any other digital device, then this book will serve as your complete guide...
8) Hack attack!
Author
Series
Formats
Description
"When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how "hackers" break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers"--
9) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digita
Author
Description
Security is a shared responsibility, and we must all own it
KEY FEATURES ● Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.● Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.● Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.
DESCRIPTION Once a business is connected to the Internet,...
Author
Series
Description
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.
Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.
We...
Author
Description
Originalmente, el término "hacker" se refería a un programador experto en sistemas operativos de computadoras y código de máquina. Hoy, se refiere a cualquiera que realice actividades de piratería o piratería. La piratería es el acto de cambiar las características de un sistema para lograr un objetivo que no está dentro del propósito original del creador. La palabra "piratería" generalmente se percibe negativamente, especialmente por personas...
Author
Series
Description
This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors...
Author
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Description
Le Guide du débutant à la piraterie informatique éthique et le test de pénétration. À l'origine, le terme "hacker" désignait un programmeur qui maîtrisait les systèmes d'exploitation informatiques et le code machine. Aujourd'hui, il s'agit de toute personne qui pratique des activités de piratage informatique. Le piratage est l'acte de changer les caractéristiques d'un système pour atteindre un but qui l'est.
À l'origine, le terme "hacker"...
Author
Description
COMPUTER HACKING
Most people are quite familiar with the word hacker due to the attention these entities get in the media. In this book, you will learn about how the world of hacking is growing and what you can do to protect your business from being the victim of a hacking. The last thing any business owner wants to do is leave themselves open to attacks due to lack of knowledge and planning on their part. This book will show you how you can take...
Author
Description
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed, they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles, you want the best measures you can afford. But, you need to operate with the assumption that Prevention and Detection will eventually...
Author
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
Didn't find it?
Can't find what you are looking for? Request an item not in the catalog. Submit Request