Catalog Search Results
Author
Series
Formats
Description
"With The Pandora Deception, Bruns and Olson return with a captivating portrayal of modern day combat that "compares with the best of the timeless classics by Tom Clancy, Dale Brown, and Stephen Coonts." (Mark Greaney) To effectively combat the rise of global terrorism, the U.S. military must now rely on more than traditional weapons and tactics. Don Riley of the U.S. Cyber Command is given charge of a brand new effort: a new team in the CIA Operations...
Author
Formats
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Formats
Description
"In the wake of a highly contagious virus, California is under quarantine. Sequestered in high rise towers, the living can't go out, but the dead can come in--and they come in all forms, from sad rolling cans to manufactured bodies that can pass for human. Wealthy participants in the 'companionship' program choose to upload their consciousness before dying, so they can stay in the custody of their families. The less fortunate are rented out to strangers...
4) The dark net
Author
Formats
Description
"The dark net is real. An anonymous and often criminal arena that exists in the secret, far reaches of the Web, some use it to manage Bitcoins, pirate movies and music, or traffic in drugs and stolen goods. And now, an ancient darkness is gathering there as well. These demons are threatening to spread virally into the real world, unless they can be stopped by members of a ragtag crew: Twelve-year-old Hannah, who has been fitted with the Oculus, a...
Author
Series
The circle volume 1
Formats
Description
An Adrenaline-Laced Epic Where Dreams and Reality Collide. Fleeing assailants through deserted alleyways, Thomas Hunter narrowly escapes to the roof of a building. Then a silent bullet from the night clips his head . . . and his world goes black. From the blackness comes an amazing reality of another world where evil is contained. A world where Thomas Hunter is in love with a beautiful woman. But then he remembers the dream of being chased through...
6) Hack attack!
Author
Series
Formats
Description
"When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how "hackers" break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers"--
7) Toxic game
Author
Series
Formats
Description
"#1 New York Times bestselling author Christine Feehan takes readers into the hot zone in this pulse-pounding GhostWalker novel. On a rescue mission in the heart of the Indonesian jungle, Dr. Draden Freeman and his GhostWalker team need to extract the wounded as quickly as possible--or risk spreading a deadly virus unleashed by a terrorist cell. When Draden gets infected he forces his team to leave him behind. He won't risk exposing anyone else. He...
Author
Description
Get the Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier in 20 minutes. Please note: This is a summary & not the original book. "The Hacker Crackdown" delves into the complex world of hackers, law enforcement, and the telecommunications industry, set against the backdrop of a major AT&T network failure in 1990. The book explores the historical development of telephone technology, from Alexander Graham Bell's...
Author
Description
Los cambios tecnológicos del último siglo han generado un nuevo y disruptivo dominio —el ciberespacio—, el cual no solo está modificando la vida a nivel individual de las personas, sino también a nivel macro. Por ello, hoy los organismos responsables de la defensa en distintas partes del mundo, han debido rearticular sus procedimientos y prioridades, al tener que asumir, además de la protección de los dominios tradicionales de tierra, mar...
Author
Description
How Not to Get Phished equips you with the knowledge and tools to:Unmask the tactics phishers use to steal your information and money.Become a cybersecurity sleuth,sharpening your eye to spot red flags and avoid falling victim.Build a fortress around your accounts with essential security practices.Navigate the digital world confidently with proactive online habits.Respond effectively if you suspect you've been phished, minimizing damage and recovering...
Author
Description
In "CyberSecure™," readers embark on an enlightening journey through the multifaceted world of cybersecurity. The book unfolds gracefully, each topic building naturally upon the last to provide a seamless reading experience. Beginning with the psychological underpinnings of cybersecurity, the book escalates to strategic defenses against complex digital threats, offering practical advice and insights along the way.Readers will discover a treasure...
Author
Description
In the ever-evolving realm of cybersecurity, understanding and combating malicious activities is not just a professional requirement but a global imperative. The CompTIA Security+ SY0-701 exam is a beacon for those navigating these treacherous waters, illuminating the path to robust digital defenses.DDoS attacks, the cyber equivalent of a siege, aim to bring down networks by sheer force of traffic. Yet, they are not invincible. With strategic mitigation...
Author
Description
Dive into the captivating world of hacking with "Hacking." This comprehensive guide takes you through the intricacies of cybersecurity, from understanding the basics to mastering advanced techniques. Perfect for beginners and seasoned professionals alike, this book provides the tools and knowledge needed to navigate the digital landscape safely and effectively.
In "Hacking," you'll discover how to:Grasp the fundamental concepts of hacking and cybersecurityDifferentiate...
Author
Description
Malware involves the worms, Trojan horses and viruses that do malicious activities on mobile and computers by controlling and destroying software processes. Data from Tencent Mobile Security Laboratory reveal that malware consists of various threats and will continue to pop up. Many methods and techniques are necessary for protection against malware. When web users download free software and games from the malicious and unsafe websites, then malicious...
Author
Description
HACKING
With growing digital dependence and an increase in cyber threats, you cannot afford to be in the dark as far as your digital and online security is concerned. This book is a simple guide that will reveal the many potential risks and mistakes that can expose you to hackers.
This is a book for anyone and everyone. If you use a mobile phone, computer, or any other digital device, then this book will serve as your complete guide...
Author
Series
Formats
Description
Find out what goes on every day Inside the Germs! Detailed illustrations, color photos, and simple text combine to make a fun and easy introduction to how germs work. This book also includes simple activities and crafts like Glitter Germs, Bacteria Splits and an edible cell with how-to photos to further engage young learners. Aligned to Common Core Standards and correlated to state standards. Super Sandcastle is an imprint of Abdo Publishing, a division...
Author
Description
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed, they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles, you want the best measures you can afford. But, you need to operate with the assumption that Prevention and Detection will eventually...
Author
Description
Are you concerned about the potential dangers of artificial intelligence?While AI promises incredible benefits for both Experts and beginners, for kids and adults, for learning and protecting, for education and health care, its rapid development and rise in revolution comes with unforeseen risks, particularly the growing threat of AI-powered fraud. This book, The Dark Side of AI, dives deep into the seven cunning ways malicious actors exploit AI technologies...
Author
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Description
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones, protected with ironclad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your...
Didn't find it?
Can't find what you are looking for?
Search Hurst Public LibraryOr request an item not in the catalog. Submit Request