Catalog Search Results
Author
Series
Language
English
Formats
Description
Businesses are frequently under attack by rivals and antagonists, and their reputations can be ruined by false websites, hacking and rumor-mongering online. Debbie Elicksen, an experienced author on digital issues, guides businesses with a step-by-step plan to protect their brands and deal with cyberbullies.
Author
Series
Language
English
Description
Protecting Our Future, Volume 2, completes the comprehensive examination of the cybersecurity threats to our nation's sixteen Critical Infrastructure Sectors begun in Protecting Our Future, Volume 1. Subject matter experts offer an in-depth analysis of operational needs and suggest best practices within the remaining sectors: IT, the chemical industry, commercial facilities, manufacturing, water systems and dams, emergency services, food and agriculture,...
Author
Language
English
Description
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that."Instant Citrix Security How-to" will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be...
Author
Language
English
Description
Cybersecurity for Beginners 2024: From Novice to Expert Learn how to Defend Yourself, Your Family and Yor Company from Online Attacks in a few minutes each day with the Methods of an Industry Professional A CYBERSECURITY EXPERT WHO HAS THWARTED COUNTLESS ATTACKS PUBLISHES A SIMPLE GUIDE WITH MANY OF THE SECRETS TO FEND OFF EVEN THE MOST POWERFUL HACKER ATTACKS Are you interested in the world of cybersecurity and want to learn how to protect yourself,...
Author
Language
English
Description
According to a recent iPass report, 73% of enterprises allow non-IT managed devices to access corporate resources. 65% of companies surveyed reported security issues. This eBook looks at the security risks of an increasingly mobile workforce and proposes a range of possible solutions. Topics covered include- using personal mobile devices at work (BYOD), password security, data encryption, raising user awareness, securing networks, legal aspects of...
Author
Language
Deutsch
Description
Treffen Sie Maßnahmen gegen Hackerangriffe und vermeiden Sie drohende Verwaltungsstrafen bei Sicherheitsvorfällen!
Das neue Netz- und Informationssystemsicherheitsgesetz (NISG) sieht vor, dass Betreiber wesentlicher Dienste aus den Sektoren Energie, Verkehr, Bankwesen, Finanzmarktinfrastrukturen, Gesundheitswesen, Trinkwasserversorgung und digitale Infrastruktur sowie Anbieter digitaler Dienste und Einrichtungen der öffentlichen Verwaltung Schutzmaßnahmen...
Author
Language
English
Description
Master one of the most essential tools a professional pen tester needs to know.
Book Description
This essential handbook offers a systematic journey through the intricacies of Nmap, providing both novice and seasoned professionals with the tools and techniques needed to conduct thorough security assessments with confidence. The purpose of this book is to educate and empower cyber security professionals to increase their skill set, and by extension,...
Author
Language
Français
Description
Richard abandonne de brillantes études d'informatique dans l'espoir de sauver sa mère, mais en vain. Il deviendra pirate afin de mettre en lumière la vérité sur la mort de sa mère. Sa quête de justice lui fera affronter Hypertech : la référence du nouveau monde médical. C'est le reflet de notre réalité o l'informatique est roi ; o des entreprises sont aussi puissantes que des États.
Author
Language
English
Description
Your one-stop guide to learning and implementing Red Team tactics effectively
Key Features:
- Target a complex enterprise environment in a Red Team activity
- Detect threats and respond to them with a real-world cyber-attack simulation
- Explore advanced penetration testing tools and techniques
Book Description:
Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities....
10) Zero days
Author
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Language
English
Description
Welcome to the complete guide to securing Amazon Web Services. As I was researching how to secure my AWS resources, I realized there isn't a one-stop guide for securing every piece of AWS. I've compiled from around the web (including great resources from Amazon, Evident.io, and others) to build this guide.This guide will be updated as new services arise, configuration changes occur, or other things happen that require an update to the guide.For more...
Author
Language
English
Description
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber-attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years, have refocused their efforts on the path of least resistance: users and their privileges.
In decades past, an entire enterprise...
Author
Language
English
Description
Computers are wonderful. The internet is fantastic. You are not safe online … unless you work at it.Every week there are several new revelations about security weaknesses in our hardware and software, theft of millions of pieces of personal information, and new software and techniques to combat cybercriminals.The goals of this book are to help motivate you to take some action and to teach you how to think about the privacy and security of your information...
Author
Language
English
Description
You can hack is the book which tells you the step-by-step hacking tutorials with screenshot. This book is, written in simple language, which can be easily understand by anyone. This book is best for beginners to start career in hacking. you can hack is written in different way in many books you found lot of theory and concepts and after reading many pages you understand a single step of hacking but here is totally different. In you can hack all the...
Author
Language
English
Description
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyone-not just techies-to become informed and empowered on the subject of cybersecurity.
In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such...
Author
Language
English
Description
They have the power to destroy lives, shut down businesses, and affect every one of us all around the world. They always come unannounced and you hear about them every day. Cyberattacks. The plague of today's technology-reliant world. Many consider cyberattacks pure computer magic; something too complicated to comprehend. But let me assure you, it's definitely not magic. Cyberattacks do, however, require a certain level of intelligence and computer...
Author
Language
English
Description
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments."Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and...
Author
Language
English
Description
Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory initiatives.
As a solution, Identity Access Management (IAM) has emerged as the cornerstone of enterprise security....
Author
Language
English
Description
"Securing Information in the Digital Age" is a comprehensive guide that addresses the increasingly complex challenges of information security in today's hyper-connected world. As society delves deeper into the digital realm, safeguarding personal, corporate, and governmental information becomes paramount. This book seamlessly blends foundational principles with advanced techniques, offering readers a well-rounded understanding of the modern cybersecurity...
Author
Language
Español
Description
Proteja su ordenador, sus fotos y su información más valiosa sin salirse del presupuesto o tener que contratar a un experto.
¿Y que me diría si le digo que unos pocos hábitos innovadores podrían reducir las probabilidades de que un virus infecte su equipo o ser víctima de un pirata informático? Imagine cómo sería navegar por la web sin tener que preocuparse de los terroríficos fraudes relacionados con las tarjetas de crédito o el robo...
In Interlibrary Loan
Didn't find what you need? Items not owned by Penticton Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. Items must be over 1 year old.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service for new books published this year. Submit Request