Catalog Search Results
Author
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things...
Author
Language
English
Description
There is no denying that the Covid-19 pandemic has been the cause of many changes. Many people have been working from home over the past two years, and many have been using their computers more than ever, for both business and person reasons. It is the perfect time for #Hacked – 10 Practical Cyber Security Tips to Help Protect Personal or Business Information, a new book by cyber security expert Albert Whale.
This book is a guide to the risks...
Author
Language
English
Description
Combating cybercrime is a necessity of doing business in the 21st century. Financial and identity thefts occur with annoying frequency, and no executive today can afford to ignore the damage phishing, malware, and malicious code pose to their company's future. But, with this invaluable guide, anyone, no matter what their skill level or bandwidth, can become an effective cyber risk manager.
In Fire Doesn't Innovate, cybersecurity expert Kip Boyle provides...
Author
Language
English
Description
Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard.
You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national...
Author
Language
English
Description
Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information...
Author
Language
English
Description
Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, families (variants), defense strategies, recovery methods, and legal issues related to reporting ransomware incidents to authorities and other affected parties. This book also teaches you how to develop a ransomware incident response...
Author
Language
English
Description
Every business, large and small, is vulnerable to cyber attack. If your company isn't well protected, its systems may be compromised by sophisticated hackers with malicious intentions.
Business owners, boards, CEOs, and cyber security managers must work together to combat this threat by putting effective security measures and organization in place. With Smiling Security, you can build one from the ground up in just ninety days.
These powerful strategies...
Author
Language
English
Description
Cyber security and Infrastructure Protection will be of particular interest to those with a vested interest in the protection of critical infrastructures in the U.S. – its dams, chemical plants, emergency care facilities, energy plants, and nuclear facilities. Terrorists and rogue nation states have been relentless in attempts to gain access to those systems for nefarious purposes. This book provides an overview of the numerous cyber dangers our...
Author
Language
English
Description
The frontlines of cybersecurity operations include many unfilled jobs and exciting career opportunities. A transition to a security operations center (SOC) analyst position could be the start of a new path for you. Learn to actively analyze threats, protect your enterprise from harm, and kick-start your road to cybersecurity success with this one-of-a-kind book.
Authors Tyler Wall and Jarrett W. Rodrick carefully and expertly share real-world insights...
Author
Series
Hardy Boys mystery stories volume 49
Language
English
Formats
Description
The Hardy boys dial a wrong number, get the Pentagon, and suddenly find themselves in a dangerous adventure involving national security.
71) Active defense
Author
Series
Danger never sleeps volume 3
Language
English
Description
"As a former field surgeon in Afghanistan, Heather Fontaine is used to life-or-death situations. She just didn't expect them to follow her home. When she returns from a party to find that someone has broken into her house, she assumes it is the stalker who has been creeping her out. She hopes to find safety in small town Greenville, SC. Luckily, a stalker isn't the only one watching Heather. Travis Walker has been secretly watching out for her for...
Author
Language
English
Description
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It...
Author
Language
English
Description
Unleash the Power of NSX Datacenter for Seamless Virtualization and Unparalleled Security
Book Description
"Embark on a transformative journey into the world of network virtualization with 'Ultimate VMware NSX for Professionals.' This comprehensive guide crafted by NSX experts, starts with an exploration of Software Defined Networking, NSX architecture, and essential components in a systematic approach. It then dives into the intricacies of...
74) Sweet surrender
Author
Series
Sweet series (Maya Banks) volume 1
Language
English
Description
Searching for the man who had killed his partner, Dallas cop Gray Montgomery follows a trail of clues that lead to a link between the murderer and Faith, a beautiful stranger, but when he tries to get close to her to uncover the truth, he discovers that his actions have now made Faith a target.
75) Private games
Author
Series
Language
English
Description
"Private, the world's most renowned investigation firm, has been commissioned to provide security for the 2012 Olympic games in London. Its agents are the smartest, fastest, and most technologically advanced in the world, and 400 of them have been transferred to London to protect over 10,000 competitors who represent more than 200 countries. The opening ceremony is still hours away when Private investigator and single father of twins, Nigel Steele,...
Author
Series
Guardian (Karen Robards) volume 2
Language
English
Formats
Description
"Bianca St. Ives was recently put through the wringer, but she came out the same way she always does--the way her father trained her to--hungry for a fight. Still navigating the fallout from a shocking revelation that's left a network of assassins' crosshairs trained on her, Bianca's ready to take fate into her own hands. It's kill or be killed, and she's got her finger flush against the trigger. But as Bianca races to outmaneuver her tireless pursuers,...
77) The Games
Author
Series
Language
English
Description
Rio de Janeiro, Brazil -- home to beautiful white-sand beaches, gorgeous women, stunning natural beauty, and the world's largest Carnival celebration -- knows how to throw a party. So it's a natural choice to host the biggest spectacles in sports -- the World Cup and the Olympics. To ensure that the games go off without a hitch, the organizers turn to Jack Morgan, the unflappable head of the renowned international security and consulting firm Private....
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...