Catalog Search Results
Author
Description
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes of an incident with the aim of bringing the perpetrators to justice. These two disciplines have a close but complex relationship and require a balancing act to get right, but both are essential...
Author
Series
Publisher
Sky Pony Press
Pub. Date
[2015]
Description
Herobrine is rallying all the monsters of Minecraft to one server in hopes of eliminating Gameknight999 and his friends once and for all. They destroy every village they find, threatening to continue until the User-that-is-not-a-user surrenders. Gameknight has just two things, the Oracle's command to seek out the lost ocean monument and an impenetrable riddle: "Look to the lowliest and most insignificant of creatures, for that is where your salvation...
Author
Description
Cybercriminals can ruin your life-this book teaches you to stop them before they can.
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It's important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you.
You don't have to give up on the convenience of having an online life. You can fight back and protect...
44) Stop that virus!
Author
Publisher
Random House
Pub. Date
2021
Description
What is a virus? How do you catch a cold? Beep, Boop, and the rest of the robots from Netflix's Ask the StoryBots are looking for answers. The inquisitive bots make this timely concern interesting, entertaining, and not-so-scary.
Author
Series
Description
Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.
Art of exploitation. We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies.
Network security. Using...
46) Fever
Author
Formats
Description
"Nico Storm and his father Willem drive a truck filled with essential supplies through a desolate land. They are among the few in South Africa -- and the world, as far as they know -- to have survived a devastating virus which has swept through the country. Their world turned upside down, Nico realizes that his superb marksmanship and cool head mean he is destined to be his father's protector, even though he is still only a boy. But Willem Storm,...
47) Relic
Author
Publisher
Del Rey
Pub. Date
[2018]
Description
"The last known human searches the galaxy for companionship in a new adventure novel from the legendary author of the Pip & Flinx series. Ruslan is the last surviving human being in the entire universe. Saved by a species of friendly aliens, Ruslan is forced to live life as an artifact of history, paying a lonely homage to a once-proud race that spanned the stars. Now, with the weight of his near-extinct species pressing down on him, Ruslan embarks...
Author
Description
A detailed guide to know all about PC security and backup
This guide will help you how to protect your computer from viruses, stay safe online and free internet online security software
Based on easy hacks this book will teach you about:
- Antivirus malware firewall backup
- zero-cost software download
- Microsoft security essentials
- Avast free software protection
- Firewall software
- Spyware and Adware
- How to use pop-up...
Author
Description
Cyber security has never been more essential than it is today, it's not a case of if an attack will happen, but when. This brand new edition covers the various types of cyber threats and explains what you can do to mitigate these risks and keep your data secure.
Cyber Security explains the fundamentals of information security, how to shape good organisational security practice, and how to recover effectively should the worst happen.
Written in...
Author
Description
As a cybersecurity expert who presents on TV and at security conferences regularly, Scott Schober has seen an alarmingly disproportionate number of seniors being coerced, targeted, and robbed through the same internet we all share.
From the basics of the internet to the fight for healthcare privacy and security that is so critical to our aging population, Senior Cyber offers simple advice and expertise for all levels of internet experience. Whether...
52) Hacking: A Comprehensive, Step-By-Step Guide to Techniques and Strategies to Learn Ethical Hacking w
Author
Description
As we become more and more reliant on wireless networks to live and work, learning how to protect your system has become vital, if only to save yourself from the pain of identity theft, of all the problems caused by having your system hacked and your data stolen.
Thankfully, there is a solution, and it lies in penetration testing. A form of ethical hacking, penetration testing is a skill that you should learn, especially wireless-penetration testing...
Author
Description
Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!
Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!
What's Inside:
���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to...
Author
Description
Small businesses make up over 90% of all businesses, and they account for nearly 50% of the gross domestic product. Yet, other than the bad guys, there isn't a lot of focus on cybersecurity for small businesses. This book aims to help small businesses learn what the bad guys are after, and how they can protect their businesses.
Author
Description
Unlock the Power of Blue Team Defense!
���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity Solution
Are you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers...
Author
Publisher
Harper, an imprint of HarperCollinsPublishers
Pub. Date
[2019]
Description
"In 1967, an extraterrestrial microbe came crashing down to Earth and nearly ended the human race. Accidental exposure to the particle--designated The Andromeda Strain--killed every resident of the town of Piedmont, Arizona, save for an elderly man and an infant boy. Over the next five days, a team of top scientists assigned to Project Wildfire worked valiantly to save the world from an epidemic of unimaginable proportions. In the moments before...
Author
Description
The first expert discussion of the foundations of cybersecurity
In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles. The author convincingly lays out the arguments for the absolute cybersecurity first...
Author
Publisher
Viking, an imprint of Penguin Random House LLC
Pub. Date
[2021]
Description
"When a deadly Fly Flu sweeps the globe, it leaves a shell of the world that once was. Among the survivors are eighteen-year-old Nico and her dog, on a voyage devised by Nico's father to find a mythical portal; a young artist named Kit, raised in an old abandoned cinema; and the enigmatic Deliverer, who lives Life after Life in an attempt to put the world back together. As swarms of infected Flies roam the earth, these few survivors navigate the woods...
Author
Publisher
Marvel Worldwide
Pub. Date
[2019]
Description
Artoo and Threepio steal the spotlight! Even before joining the rebellion, everyone's favorite droids had plenty of exciting adventures. With the Empire on the march, the squabbling duo find themselves right in the middle of trouble in the Kalarba system - but is Corellian rogue Jace Forno friend or foe? On the smuggler planet of Nar Shaddaa, con artist Olag Greck has a brush with the law - the newly deputized droids! Then, with a new Ithorian master...
Author
Description
A practical book that will help you defend against malicious activities
Modern Cybersecurity practices will take you on a journey through the realm of Cybersecurity. The book will have you observe and participate in the complete takeover of the network of Company-X, a widget making company that is about to release a revolutionary new widget that has the competition fearful and envious. The book will guide you through the process of the attack on...
Didn't find it?
Can't find what you are looking for? Request an item not in the catalog. Submit Request