Catalog Search Results
Author
Series
Pub. Date
[2020]
Physical Desc
xvii, 346 pages : illustrations ; 24 cm.
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
3) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
"Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
4) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Description
Before the multi-million, runaway bestseller The Da Vinci Code, Dan Brown set his razor-sharp research and storytelling skills on the most powerful intelligence organization on earth—the National Security Agency (NSA)—in this thrilling novel, Digital Fortress.
When the NSA's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher,
Author
Series
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
Author
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Author
Series
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
9) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Pub. Date
[2015]
Physical Desc
viii, 392, lx pages ; 25 cm
Description
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side. Criminals are often the earliest, and most innovative, adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and erasing computer servers. It's disturbingly easy to activate baby monitors to spy on families, to hack pacemakers to deliver a lethal jolt of electricity,...
Author
Series
Bromance book club volume 3
Pub. Date
2020.
Description
"A hacktivist and a cat café owner decode the friend zone in this romantic comedy from the author of Undercover Bromance. Alexis Carlisle and her cat café, ToeBeans, have shot to fame after she came forward as a victim of a celebrity chef's sexual harassment. When a new customer approaches to confide in her, the last thing Alexis expects is for the woman to claim they're sisters. Unsure what to do, Alexis turns to the only man she trusts--her...
Author
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Author
Pub. Date
[2015]
Physical Desc
383 pages ; 24 cm
Description
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store...
14) Zero days
Author
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Series
Rocky Mountain courage volume 3
Description
"Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. But when a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and protect her father's company. Diplomatic Security Service special...
Author
Pub. Date
2017.
Physical Desc
x, 309 pages : illustration ; 25 cm
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Didn't find it?
Can't find what you are looking for? Request an item not in the catalog. Submit Request