Catalog Search Results
21) Q Island
Author
Pub. Date
2015
Description
An ancient virus has surfaced on Long Island, NY, turning its victims into black-veined, infectious, psychopathic killers. Chaos and madness rule. In desperation, the military quarantines the island, trapping Melanie Bailey and her autistic son, Aiden. Somehow Aiden survives infection. He could be the key to a cure...if Melanie can get him to the mainland. Gang leader Jimmy Wade also survives the virus, but he's acquired a hunger for human flesh....
Series
Walking dead volume 8
Publisher
Lions Gate Home Entertainment
Pub. Date
[2018]
Description
After being brutally forced to fall under Negan's will, Rick now understands Negan can't be reasoned with, and any day could be the survivors' last. The communities join forces in the last stand against the Saviors as all-out war unfolds.
23) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digita
Author
Description
Security is a shared responsibility, and we must all own it
KEY FEATURES ● Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.● Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.● Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.
DESCRIPTION Once a business is connected to the Internet,...
Author
Series
Description
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.
Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.
We...
Author
Description
Originalmente, el término "hacker" se refería a un programador experto en sistemas operativos de computadoras y código de máquina. Hoy, se refiere a cualquiera que realice actividades de piratería o piratería. La piratería es el acto de cambiar las características de un sistema para lograr un objetivo que no está dentro del propósito original del creador. La palabra "piratería" generalmente se percibe negativamente, especialmente por personas...
Author
Series
Description
This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors...
Author
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Description
Le Guide du débutant à la piraterie informatique éthique et le test de pénétration. À l'origine, le terme "hacker" désignait un programmeur qui maîtrisait les systèmes d'exploitation informatiques et le code machine. Aujourd'hui, il s'agit de toute personne qui pratique des activités de piratage informatique. Le piratage est l'acte de changer les caractéristiques d'un système pour atteindre un but qui l'est.
À l'origine, le terme "hacker"...
Author
Description
COMPUTER HACKING
Most people are quite familiar with the word hacker due to the attention these entities get in the media. In this book, you will learn about how the world of hacking is growing and what you can do to protect your business from being the victim of a hacking. The last thing any business owner wants to do is leave themselves open to attacks due to lack of knowledge and planning on their part. This book will show you how you can take...
Author
Description
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed, they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles, you want the best measures you can afford. But, you need to operate with the assumption that Prevention and Detection will eventually...
Author
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
Author
Description
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones, protected with ironclad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your...
Author
Description
The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks. Mike thoroughly examines the essence of what ransomware is, the current trends within ransomware, and how to protect your organization from this modern threat. The book gives data driven insights on the trends within ransomware, such as the rise of the demanded sums of money and the likelihood of companies retrieving their data.
The Ransomware Handbook...
Author
Description
What every current and aspiring cyber security leader and professional needs to know to become truly exceptional. Bridging the gap between business and cyber security. Actionable rules to maximise value from cyber security and address cyber threats. Differentiating skills for professional excellence and massive career success. In a hyperconnected world powered by technology, the importance of cyber security to our collective prosperity and progress...
38) Toxic game
Author
Series
Formats
Description
"#1 New York Times bestselling author Christine Feehan takes readers into the hot zone in this pulse-pounding GhostWalker novel. On a rescue mission in the heart of the Indonesian jungle, Dr. Draden Freeman and his GhostWalker team need to extract the wounded as quickly as possible--or risk spreading a deadly virus unleashed by a terrorist cell. When Draden gets infected he forces his team to leave him behind. He won't risk exposing anyone else. He...
40) Viral: a novel
Author
Publisher
Soho Crime
Pub. Date
c2012
Description
When a pandemic virus sweeping through Third World villages expands with frightening potency, former CIA operative Charles Mallory discovers clues about a secret war and genocidal plans to create a new, technologically advanced society.
Didn't find it?
Can't find what you are looking for? Request an item not in the catalog. Submit Request