Catalog Search Results
Showing Results using Keyword index
Do you want to be sure your next purchase is reliable? Consumer Reports shares independent and unbiased ratings and reviews for 9000+ products and services. Click here to access Consumer Reports.
Author
Series
Language
English
Formats
Description
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
- The who and why of cybersecurity threats
- Basic cybersecurity concepts
- What to do to be cyber-secure
-...
Author
Language
English
Formats
Description
Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more...
Author
Pub. Date
2022
Language
English
Formats
Description
The reach of Corporations into our lives via cards and apps has never been greater; many of us rarely use cash these days. But what we're told is a natural and inevitable move is actually the work of powerful interests. And the great battle of our time is the battle for ownership of the digital footprints that make up our lives. In Cloudmoney, Brett Scott tells an urgent and revelatory story about how the fusion of Big Finance and Big Tech requires...
Author
Language
English
Formats
Description
The previously untold-and previously highly classified-story of the conflux of espionage and technology, a compelling narrative rich with astonishing revelations taking readers from World War II to the Internet age. As the digital era becomes increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative...
Author
Pub. Date
[2020]
Language
English
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Series
Language
English
Formats
Description
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.
Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into...
Author
Language
English
Formats
Description
"The world of hackers is complex. Some hackers are hired to protect private information. There are also hackers who love to cause chaos. Still, the realm of hackers isn't just black and white. There is a world of gray, too. Develop your expertise with expressions as you explore the secret lives of these computer-programming experts"--
Author
Series
Language
English
Description
Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the...
Author
Series
Language
English
Formats
Description
Learn all about the famous social-networking site Facebook with projects inspired by its features and functions. Create profile posters for famous people from the past, write status updates from your pet's perspective, and invent your own emoticons. Step-by-step directions and colorful photos bring each project to life. -- Publisher description.
Author
Pub. Date
[2023]
Language
English
Description
"This book is an easy-to-follow series of tutorials that will lead readers through different facets of protecting household or small-business networks from cyber attacks. You'll learn how to use pfSense to build a firewall, lock down wireless, segment a network into protected zones, configure a VPN (virtual private network) to hide and encrypt network traffic and communications, set up proxies to speed up network performance and hide the source of...
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Pub. Date
[2020]
Language
English
Description
"When your organization falls victim to cybercrime, you need to be ready to fight back. The burden of investigating digital security breaches often falls to organizations themselves, so developing a robust toolkit that enables you to track down criminals is essential. Hunting Cyber Criminals is filled with proven techniques to research the source of illicit network traffic, extract intelligence from publicly available web sources, and hunt the individuals...
Author
Series
Language
English
Formats
Description
From New York Times bestselling author James Rollins comes a lightning-paced short story, in which a major attack on U.S. soil can only be stopped by ... The Midnight Watch In the dead of night, a faceless enemy hacks into the Smithsonian Institution's network of servers, but it is only the first strike masking a larger attack. To rescue a biologist trapped in the National Museum of Natural History and to discover the true intent behind an assault...
20) Corsair
Author
Pub. Date
2015.
Edition
First edition.
Language
English
Description
"In the early 2020s, two young, genius computer hackers, Elizabeth Santiago and David Schwartz, meet at MIT, where Schwartz is sneaking into classes, and have a brief affair. David is amoral and out for himself, and soon disappears. Elizabeth dreams of technology and space travel and takes a military job after graduating. Nearly ten years later, David is setting himself to become a billionaire by working in the shadows ... and Elizabeth works in intelligence...
Interlibrary Loan
Didn't find what you need? Items not owned by Main Library Alliance members might be available in other libraries across New Jersey. You can search JerseyCat and place a request for the item to be sent to your library.
If your library doesn't permit JerseyCat requests or the item can't be found, you can also contact your library for assistance.Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request