Catalog Search Results
Author
Language
English
Description
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
Author
Language
English
Formats
Description
Computers are everywhere. Some are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak personal data about us. Governments and companies increasingly use computers to monitor what we do. Social networks and advertisers know more...
Author
Series
Language
English
Formats
Description
Cloud technology has changed the way we approach technology. It's also given rise to a new set of security challenges caused by bad actors who seek to exploit vulnerabilities in a digital infrastructure. You can put the kibosh on these hackers and their dirty deeds by hardening the walls that protect your data.
Using the practical techniques discussed in Cloud Security For Dummies, you'll mitigate the risk of a data breach by building security into...
Author
Series
Language
English
Formats
Description
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
- The who and why of cybersecurity threats
- Basic cybersecurity concepts
- What to do to be cyber-secure
-...
Pub. Date
2014.
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Language
English
Formats
Description
"In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance...
Author
Pub. Date
2022
Language
English
Formats
Description
The reach of Corporations into our lives via cards and apps has never been greater; many of us rarely use cash these days. But what we're told is a natural and inevitable move is actually the work of powerful interests. And the great battle of our time is the battle for ownership of the digital footprints that make up our lives. In Cloudmoney, Brett Scott tells an urgent and revelatory story about how the fusion of Big Finance and Big Tech requires...
Author
Language
English
Formats
Description
Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical...
13) The cybersecurity playbook: how every leader and employee can contribute to a culture of security
Author
Language
English
Formats
Description
"Today's headlines are littered with cybersecurity breaches -- each more damning than the last. For too long, cybersecurity has been relegated to the corridors of IT. Every organization's weakest link in cybersecurity is its own employees, as hackers dupe them to get access to an organization's systems. Yet most employees have no idea how to help prevent attacks, why they should bother, or what to look for. But, with any manager or employee the next...
Author
Language
English
Formats
Description
Takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats,...
Author
Language
English
Formats
Description
In his worldwide bestseller Secrets and Lies, Bruce Schneier made the case that achieving successful computer security is about more than just hardware and software, it's people. Truly, the greatest vulnerability in protecting the business assets of any company often lies with the company's own employees. Although corporations go to great lengths to install state of the art systems, they continue to ignore the human element of information security....
Author
Pub. Date
2015.
Language
English
Description
"The book's content is based on McKinsey's proprietary research, client experience and interviews with over 200 executives, regulators and security experts. This effort has four main findings: Pervasive digitization, open and inter-connected technology environments and sophisticated attackers make cyber-attacks a critical social and business issue that could materially slow the pace of technology and bushiness innovation with as much as $3 trillion...
Author
Language
English
Formats
Description
"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back. From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media. Two top media experts recount vivid tales of character attacks,...
Author
Language
English
Formats
Description
Preventing Credit Card Fraud looks at all angles of this crime and is an easily-accessible guide that everyone engaged in online purchases and sales needs to have to become better informed of what they can do and how they can keep their personal information more secure.
Interlibrary Loan
Didn't find what you need? Items not owned by Main Library Alliance members might be available in other libraries across New Jersey. You can search JerseyCat and place a request for the item to be sent to your library.
If your library doesn't permit JerseyCat requests or the item can't be found, you can also contact your library for assistance.Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request