Catalog Search Results
Author
Series
Language
English
Description
Did you know your car can be hacked? Your medical device? Your employer's HVAC system? Are you aware that bringing your own device to work may have security implications? Consumers of digital technology are often familiar with headline-making hacks and breaches, but lack a complete understanding of how and why they happen, or if they have been professionally or personally compromised. In Cybersecurity in Our Digital Lives, twelve experts provide much-needed...
Author
Language
English
Description
Recent regulations about cybersecurity put pressure on every Board Director and C-Suite executive to understand the risks and impact of a breach. When your company's CIO or CISO speaks, how much do you understand? If you don't speak the language of cybersecurity, you are not only at a disadvantage, but you could also be legally liable.
This book was written to be a translator, handbook, and dictionary for anyone who isn't an expert in the world...
Author
Language
English
Description
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard.
You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national...
Author
Language
English
Description
Security software is often expensive, restricting, burdensome, and noisy. OSSEC-HIDS was designed to avoid getting in your way and to allow you to take control of and extract real value from industry security requirements. OSSEC-HIDS is a comprehensive, robust solution to many common security problems faced in organizations of all sizes. "Instant OSSEC-HIDS" is a practical guide to take you from beginner to power user through recipes designed based...
Author
Language
English
Description
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
In Fire Doesn't Innovate, cybersecurity expert Kip Boyle provides...
Author
Language
Deutsch
Description
Anhand vieler Praxisbeispiele und Merksätze bietet das Buch einen leicht verständlichen Einstieg in die technische und organisatorische Datensicherheit. Es liefert einen Einblick in das für Datenschutzbeauftragte obligatorische technische Wissen. Datensicherheit ist ein untrennbarer Teil des Datenschutzes, der mehr und mehr in unserer Gesellschaft an Bedeutung gewinnt. Er kann nur dann wirksam umgesetzt werden, wenn ein Verständnis für technische...
27) Firewalls Don't Stop Dragons: A Step-by-Step Guide to Computer Security and Privacy for Non-Techies
Author
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and...
Author
Language
English
Description
Security is driven by requirement and design and we implement security on the basis of the requirements provided by analysts. In this book, we take a programmatic approach to understand Java EE and GlassFish security.
You will find plenty of code samples in this book. It is easy to secure your application when you have a demonstration of a complete and working application explained in the book, isn't it? Each chapter starts with the importance and...
Author
Language
English
Description
There is no denying that the Covid-19 pandemic has been the cause of many changes. Many people have been working from home over the past two years, and many have been using their computers more than ever, for both business and person reasons. It is the perfect time for #Hacked – 10 Practical Cyber Security Tips to Help Protect Personal or Business Information, a new book by cyber security expert Albert Whale.
This book is a guide to the risks...
Author
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things...
Author
Series
Language
Deutsch
Description
Kristin Weber, Andreas E. Schütz und Tobias Fertig zeigen in diesem essential, wie Mitarbeiter in acht Schritten für das Thema Informationssicherheit sensibilisiert werden können. Vorgestellt wird ein Vorgehen, welches Erkenntnisse aus der Verhaltenspsychologie berücksichtigt und somit eine passgenaue Auswahl von Sensibilisierungsmaßnahmen erlaubt. Projektbeispiele illustrieren die Umsetzbarkeit des Modells. Damit beschreiben die Autoren eine...
Author
Language
English
Description
Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions.
Business owners, boards, CEOs, and cyber security managers must work together to combat this threat by putting effective security measures and organization in place. With Smiling Security, you can build one from the ground up in just ninety days.
These powerful strategies...
Author
Language
English
Description
Cyber security and Infrastructure Protection will be of particular interest to those with a vested interest in the protection of critical infrastructures in the U.S. – its dams, chemical plants, emergency care facilities, energy plants, and nuclear facilities. Terrorists and rogue nation states have been relentless in attempts to gain access to those systems for nefarious purposes. This book provides an overview of the numerous cyber dangers our...
Author
Language
English
Description
Applying a top 10 best practices approach to leverage security information event management (SIEM), this e-book offers infosec professionals the means to gain more assured value from SIEM. Whether seeking to streamline incident response, automate compliance processes, better manage security and operational risk, or build out deployments, examine key process, metrics and technology considerations.
Author
Language
English
Description
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.
Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights...
36) Private L.A
Author
Series
Private Detective Agency novels volume 6
Language
English
Description
Thom and Jennifer Harlow are the perfect couple, with three perfect children. When they disappear without a word from their ranch, facts are hard to find. They live behind such a high wall of security and image control that even world-renowned Private Investigator Jack Morgan can't get to the truth. But as Jack keeps probing, secrets sprout thick and fast.
Author
Language
English
Description
Become a Cisco security specialist by developing your skills in network security and explore advanced security technologies
Key Features Enhance your skills in network security by learning about Cisco's device configuration and installation Unlock the practical aspects of CCNA security to secure your devices. Explore tips and tricks to help you achieve the CCNA Security 210-260 Certification Book Description
With CCNA Security certification, a network...
Author
Language
English
Description
Python is an easy-to-learn and cross-platform programming language that has unlimited third-party libraries. Plenty of open source hacking tools are written in Python, which can be easily integrated within your script. This book is packed with step-by-step instructions and working examples to make you a skilled penetration tester. It is divided into clear bite-sized chunks, so you can learn at your own pace and focus on the areas of most interest...
Author
Language
English
Description
Password security is a critical matter when it comes to protecting the interests of application users and their data for a satisfactory user experience. With the advancement in technology, now more than ever, application developers need to be able to implement reliable mechanisms to prevent passwords from being stolen. Java Password and Authentication Security provides a practical approach to implement these reliable mechanisms with the possibility...
Author
Language
English
Description
Master Python scripting to build a network and perform security operations
Key Features
Learn to handle cyber attacks with modern Python scripting
Discover various Python libraries for building and securing your network
Understand Python packages and libraries to secure your network infrastructure
Book Description
It's becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident,...
In Interlibrary Loan
Didn't find what you need? Items not owned by Penticton Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. Items must be over 1 year old.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service for new books published this year. Submit Request