Catalog Search Results
Author
Language
English
Description
If you are looking for a comprehensive, soup-to-nuts resource on SSL/TLS, look no further. This book, geared towards bridging the gap between the absolute beginner and the veteran IT Professional, combines the theoretical and the practical in equal measure.
The first half of our book focuses on foundational theory, covering topics such as:
• Symmetric vs Asymmetric cryptography
• One-Way functions
• Digital Signatures
• Key Generation
•...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Language
English
Description
In today's digital landscape, web apps evolve rapidly, demanding enhanced security. This “Ultimate Web Authentication Handbook” offers a comprehensive journey into this realm. Beginning with web authentication basics, it builds a strong foundation. You'll explore cryptography fundamentals, essential for secure authentication. The book delves into the connection between authentication and network security, mastering federated authentication via...
Author
Language
English
Description
Ever wondered how a Hacker thinks? Or how you could become a Hacker? This book will show you how Hacking works. You will have a chance to understand how attackers gain access to your systems and steal information. Also, you will learn what you need to do to protect yourself from cyber threats and the most common hacking techniques used today. Structured in 10 chapters, all about cyber-security and ethical hacking, this is in short what the book covers...
Author
Language
English
Description
Practical gateway to securing web applications with OIDC, OAuth, SAML, FIDO, and Digital Identity to.
KEY FEATURES ? Dive into real-world practical hands-on experience with authentication protocols through sample code.? Gain a programmer's perspective on cryptography, certificates, and their role in securing authentication processes.? Explore a wide array of authentication protocols, including TLS, SAML, OAuth, OIDC, WebAuthn, and Digital Identity.?...
Author
Language
English
Description
Introducing the "Defense in Depth" Book Bundle
Are you concerned about the ever-growing threats to your digital world? Do you want to fortify your network security and bolster your cyber resilience? Look no further - the "Defense in Depth" book bundle is your ultimate resource to safeguard your digital assets.
This comprehensive bundle consists of four carefully curated volumes, each designed to cater to different levels of expertise, from beginners...
Author
Language
English
Description
"Safeguarding the Digital Fortress: A Guide to Cyber Security" is an essential resource that equips readers with the knowledge and tools needed to navigate the complex world of cyber security. In this comprehensive guide, a clear and concise roadmap for individuals and organizations to protect their digital assets from the ever-evolving threats of the digital age is provided. Chapters included:Chapter 1: Fundamentals of Information SecurityChapter...
Author
Language
English
Description
Cryptography is essential for protecting sensitive information, but it is often performed inadequately or incorrectly. Hands-On Cryptography with Python starts by showing you how to encrypt and evaluate your data. The book will then walk you through various data encryption methods,such as obfuscation, hashing, and strong encryption, and will show how you can attack cryptographic systems. You will learn how to create hashes, crack them, and will understand...
Author
Language
English
Description
COMPUTER HACKING
Most people are quite familiar with the word hacker due to the attention these entities get in the media. In this book, you will learn about how the world of hacking is growing and what you can do to protect your business from being the victim of a hacking. The last thing any business owner wants to do is leave themselves open to attacks due to lack of knowledge and planning on their part. This book will show you how you can take...
Author
Language
English
Description
Introducing the "Wireless Security Masterclass" Book Bundle - Your Path to Becoming a Wireless Security Expert!
���� Are you concerned about the security of your wireless networks? ���� Want to learn the ins and outs of penetration testing and ethical hacking? ���� Seeking a comprehensive resource to master wireless security from beginner to expert level?
Look no further! Our "Wireless Security Masterclass" book bundle is...
Author
Language
English
Description
Malware, DoS attacks, SQLi, and data exfiltration are some of the problems that many security officers have to face every day. Having advanced knowledge in communications and protocol analysis is therefore essential to investigate and detect any of these attacks. Tshark is the ideal tool for professionals who wish to meet these needs, or students who want to delve into the world of networking.Instant Traffic Analysis with Tshark How-to is a practical,...
Author
Language
English
Description
The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks. Mike thoroughly examines the essence of what ransomware is, the current trends within ransomware, and how to protect your organization from this modern threat. The book gives data driven insights on the trends within ransomware, such as the rise of the demanded sums of money and the likelihood of companies retrieving their data.
The Ransomware Handbook...
Author
Language
English
Description
MFA has emerged as an essential defense strategy in the wide-ranging landscape of cybersecurity. This book is a comprehensive manual that assists you in picking, implementing, and resolving issues with various authentication products that support MFA. It will guide you to bolster application security without sacrificing the user experience. You'll start with the fundamentals of authentication and the significance of MFA to familiarize yourself with...
95) In his keeping
Author
Series
Slow burn novels volume 2
Language
English
Description
"Abandoned as a baby to a young wealthy couple and raised in a world of privilege, Arial has no hint of her past or who she belonged to. Her only link lies in the one thing that sets her apart from everyone else--telekinetic powers. Protected by her adoptive parents and hidden from the public to keep her gift secret, Ari is raised in the lap of luxury, and isolation. That is, until someone begins threatening her life. Beau Devereaux is no stranger...
Author
Language
English
Formats
Description
Cybersecurity experts present an accessible, informative, and fully illustrated guide to protecting yourself, your assets, and your loved ones online.
As we live more of our lives online, we need to be more aware of the risks we face-and what we can do to protect ourselves. We all know that our identities can be stolen, and that intellectual property can be copied and sold. But, even scarier things are now possible. Vehicle systems can be hacked,...
Author
Language
English
Description
In late 2014, Arundhati Roy, John Cusack, and Daniel Ellsberg traveled to Moscow to meet with NSA whistleblower Edward Snowden. The result was a series of essays and dialogues in which Roy and Cusack reflect on their conversations with Snowden. In these provocative and penetrating discussions, Roy and Cusack discuss the nature of the state, empire, and surveillance in an era of perpetual war, the meaning of flags and patriotism, the role of foundations...
98) Princess
Author
Series
Language
English
Description
A secret and the British crown make a murderous combination in this page-turning suspense novel in the #1 bestselling Private series.
Private, the best investigation unit in the world, has agents who are the smartest, fastest, and most technologically advanced in the world — and they always uncover the truth. No wonder the most influential men and women on the planet seek their help on a daily basis.
But there's only one client who...
Private, the best investigation unit in the world, has agents who are the smartest, fastest, and most technologically advanced in the world — and they always uncover the truth. No wonder the most influential men and women on the planet seek their help on a daily basis.
But there's only one client who...
99) Guía para la gestión de calidad y la seguridad laboral de los servicios de salud: Versión global
Author
Language
Español
Description
Esta obra, tiene el solo propósito de promover y facilitar conocimientos y herramientas para optimizar los recursos y actividades de la gestión organizacional, mediante la planificación, implementación, evaluación y la mejora continua de un sistema integrado de gestión de la calidad, seguridad laboral y medio ambiente para el personal de todo tipo de establecimientos de atención de la salud.
De esta forma, se puede obtener un doble objetivo,...
100) CloudFlare Starter
Author
Language
English
Description
Ensuring your website is up, fast, and secure is a difficult yet crucial task. Learning how to protect and safeguard your web presence from malicious attackers whilst also making sure that it is optimized is important for any website administrator. CloudFlare helps you augment your website with additional security, as well as provide the extra bit of speed that will set you apart from the competition."Instant CloudFlare Starter" will show you how...
In Interlibrary Loan
Didn't find what you need? Items not owned by Penticton Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. Items must be over 1 year old.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service for new books published this year. Submit Request