Catalog Search Results
Author
Language
English
Description
Passionate and cogent, this could be the most important book of the year for Canadians We are complacent. We bask in the idea that Canada holds 20% of the world's fresh water - water crises face other countries, but not ours. We could not be more wrong. In Boiling Point, bestselling author and activist Maude Barlow lays bare the issues facing Canada's water reserves, including long-outdated water laws, unmapped and unprotected groundwater reserves,...
Author
Language
English
Description
We never know when violence might be visited upon us-at home, in the workplace, at school-anywhere. Crime, sexual assaults, threats to our children, and terrorist attacks are all part of the global landscape.
There are concrete measures anyone can take to mitigate danger and if necessary, to fight like a sociopath to defeat a sociopath.
Robert Montgomery wrote Seconds to Live or Die to help you prevail in the face of unexpected violence. Drawing...
Author
Language
English
Description
Not since Robert McNamara has a secretary of defense been so hated by the military and derided by the public, yet played such a critical role in national security policy-with such disastrous results.
Donald Rumsfeld was a natural for secretary of defense, a position he'd already occupied once before. He was smart. He worked hard. He was skeptical of the status quo in military affairs and dedicated to high-tech innovations. He seemed the right man...
Author
Language
Español
Description
El phishing es un tipo de ingeniería social en el que un atacante envía un mensaje fraudulento (por ejemplo, suplantado la identidad de una entidad bancaria) diseñado para engañar a una persona para que revele información confidencial al atacante, o bien para implementar software malicioso en el equipo informático de la víctima con el objetivo de secuestrar sus datos.
Los ciberdelincuentes suelen intentar robar nombres de usuario, contraseñas,...
Author
Language
English
Description
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused.
Although the main focus is on implementation of the NIST 800 RMF process,...
Author
Series
Slow burn novels volume 4
Language
English
Description
Eliza Cummings fought free of a monster who terrorized her when she was an innocent teenager and helped put him away for good. She took a job with Devereaux Security Services and devoted every hour to taking down the very thing she'd nearly become. No one, not even those closest to her, know her darkest, shameful secrets. But now the killer has been set free on a legal loophole and it's only a matter of time before he comes for her. Eliza's only choice...
Author
Language
English
Description
"The best-selling author of The Debt to Pleasure and Capital returns with a chilling fable for our time. Ravaged by the Change, an island nation in a time very like our own has built the Wall--an enormous concrete barrier around its entire border. Joseph Kavanagh, a new Defender, has one task: to protect his section of the Wall from the Others, the desperate souls who are trapped amid the rising seas outside and attack constantly. Failure will result...
29) Private games
Author
Series
Accelerated Reader
IL: UG - BL: 6.6 - AR Pts: 13
Language
English
Description
"Private, the world's most renowned investigation firm, has been commissioned to provide security for the 2012 Olympic games in London. Its agents are the smartest, fastest, and most technologically advanced in the world, and 400 of them have been transferred to London to protect over 10,000 competitors who represent more than 200 countries. The opening ceremony is still hours away when Private investigator and single father of twins, Nigel Steele,...
Author
Language
Español
Description
Como profesionales de seguridad de la información, la evaluación y mitigación de riesgos son las partes claves en nuestro trabajo. Tratar con el riesgo es el tema de nuestras funciones, ya sea como ingenieros de firewall, auditores, evaluadores de penetración, administración, etc.
Las funciones clave del dominio de Seguridad y Gestión de Riesgos son el análisis y mitigación de riesgos, además de garantizar la implementación de la mejor estructura...
32) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
34) Undercover wolf
Author
Series
Language
English
Description
Now that STAT and MI6 have to team up to stop a crew of supernatural bad guys intent on causing a nuclear meltdown, alpha werewolf Harley Grant can no longer deny her inner wolf and Sawyer can no longer hide his as they discover things aren't what they seem.
Author
Language
English
Description
Former Secretary of the Department of Homeland Security Janet Napolitano offers an insightful analysis of American security at home and a prescription for the future.
Created in the wake of the greatest tragedy to occur on U.S. soil, the Department of Homeland Security was handed a sweeping mandate: make America safer. It would encompass intelligence and law enforcement agencies, oversee natural disasters, commercial aviation, border security and...
Author
Language
English
Description
The internet can be a fearful and frightening place, especially when we hear about things like online identity theft. As scary as they may seem, there are some simple steps that anyone can take to protect ourselves from those dangers.
This audiobook will explain what those threats are, and what you can use to guard against being a victim. It's all broken down in simple terms you can understand. Once you have a basic understanding of how the pieces...
Author
Language
English
Description
This book is the best recipe for becoming an expert on information security. If you aspire to be a security expert by taking the CISSP exam, there is no shortage of books that claim to be the ultimate solution to information security. They dupe students into thinking that they are the only books on the market for this specific subject.
Well, they may be dubbed as the ultimate but are they the most reader-friendly books for this dry subject? Will there...
38) Attack surface
Author
Series
Language
English
Description
In her day job as a counterterrorism wizard for a transnational cybersecurity firm, Masha Maximow made the hacks that allowed repressive regimes to spy on dissidents. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection. But when it hits close to home, and the hacks and exploits she's devised are directed at her friends and family, Masha realizes she has to choose. A standalone...
Author
Series
Language
English
Description
In this exciting, visionary, and all-too-plausible next chapter in the legendary Dale Brown's New York Times bestselling techno-warfare series, Brad McLanahan and the Iron Wolf Squadron must fight the Russians on a dangerous, untested battlefield: outer space.
The previous administration's ineffective response to the growing Russian threat has left America vulnerable. Setting a bold course for America's defense, the decisive and strong new president,...
Author
Language
English
Description
"The Blue Communities Project is dedicated to three primary things: that access to clean, drinkable water is a basic human right; that municipal and community water will be held in public hands; and that single-use plastic water bottles will not be available in public spaces. With its simple, straightforward approach, the movement has been growing around the world for a decade. Today, Paris, Berlin, Bern, and Victoria are just a few of the cities...
In Interlibrary Loan
Didn't find what you need? Items not owned by Penticton Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. Items must be over 1 year old.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service for new books published this year. Submit Request