Catalog Search Results
Author
Series
Pub. Date
[2020]
Physical Desc
xvii, 346 pages : illustrations ; 24 cm.
Description
Protecting your business and family against cyber attacks! If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You will learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover once there has been a breach! This book helps you identify vulnerabilities...
Author
Formats
Description
The previously untold-and previously highly classified-story of the conflux of espionage and technology, a compelling narrative rich with astonishing revelations taking readers from World War II to the Internet age. As the digital era becomes increasingly pervasive, the intertwining forces of computers and espionage are reshaping the entire world; what was once the preserve of a few intelligence agencies now affects us all. Corera's compelling narrative...
Author
Pub. Date
c2013
Physical Desc
iii, 161 p. ; 24 cm.
Description
Analyzes the threat of an electromagnetic pulse event, arguing that America's defenses are not prepared for a natural or man-made incident that could devastate a country almost entirely dependent on its electrical grid for power and communication.
Author
Pub. Date
2022.
Physical Desc
xxxi, 329 pages : illustrations (black and white) ; 23 cm
Description
"All organisations are affected by fraud, but disproportionately so for SMEs given their size and vulnerability. Some small businesses that have failed to manage business fraud effectively have not only suffered financially; they have not survived. This book provides a guide for SMEs to understand the current sources of business fraud risk and the specific risk response actions that can be taken to limit exposure, through the structured discipline...
Author
Formats
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Author
Pub. Date
2011
Physical Desc
296 p.; 23 cm.
Description
"Aaron Elkins has been hailed as "a master" (The Dallas Morning News) for his Edgarʼ Award-winning Gideon Oliver mysteries. Now, in an original new novel, he illustrates how quickly everything can go wrong when you ask: What's the worst that can happen? For Bryan Bennett, designing hostage negotiation programs is the perfect job--as long as he keeps a safe, theoretical distance. What he can't do is deal directly with kidnappers or their victims,...
Author
Pub. Date
2013.
Formats
Description
On the night of September 11, 2012, the American diplomatic mission at Benghazi, Libya, came under ferocious attack by a heavily armed group of Islamic terrorists. The prolonged firefight, and the attack hours later on a nearby CIA outpost, resulted in the deaths of four Americans, including the American ambassador to Libya. After the fall of Qaddafi, Benghazi had been transformed into a hotbed of fundamentalist fervor and the center of gravity for...
Author
Pub. Date
[2013]
Physical Desc
xvi, 431 pages, 16 unnumbered pages of plates : illustrations, maps ; 23 cm.
Description
"Before smartphones, before the Internet and before the personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world's largest machine: the telephone system. Starting with Alexander Graham Bell's revolutionary 'harmonic telegraph, ' by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators...
Author
Description
"A decorated former Air Force pilot. A pregnant flight attendant. A dedicated TSA agent. The fates of these three, and many others, converge in Danielle Steel's gripping new novel--a heart-stopping thriller that engages ordinary men and women in the fight of their lives during a flight from New York to San Francisco. On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another...
Author
Formats
Description
The United States military now views cyberspace as the "fifth domain" of warfare, alongside land, air, sea, and space. The Pentagon, the National Security Agency, and the CIA field teams of hackers who launch cyber strikes against enemy targets--and amass staggering quantities of personal information on all of us. These same virtual warriors, along with a growing band of private-sector counterparts, are charged with defending us against the vast array...
Author
Pub. Date
[2018]
Physical Desc
xv, 320 pages ; 24 cm
Description
"The Age of Google, built on big data and machine intelligence, has been an awesome era. But it's coming to an end. In Life after Google, George Gilder--the peerless visionary of technology and culture--explains why Silicon Valley is suffering a nervous breakdown and what to expect as the post-Google age dawns. Google's astonishing ability to 'search and sort' attracts the entire world to its search engine and countless other goodies--videos, maps,...
Author
Pub. Date
2017.
Physical Desc
x, 309 pages : illustration ; 25 cm
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Pub. Date
2023.
Physical Desc
xvi, 317 pages ; 25 cm
Description
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by...
Didn't find it?
Can't find what you are looking for? Request an item not in the catalog. Submit Request