Catalog Search Results
2) The director
Author
Pub. Date
2014
Language
English
Formats
Description
In David Ignatius' s gripping new novel, spies don' t bother to steal information . . . they change it, permanently and invisibly. Graham Weber has been director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber isn' t sure where to turn until he meets...
Author
Series
Accelerated Reader
IL: MG - BL: 4.6 - AR Pts: 1
Language
English
Formats
Description
From the interesting and intriguing to the weird and wonderful Odd Jobs: Ethical Hacker is HIGH interest combined with a LOW level of complexity to help struggling readers along. The carefully written, considerate text will hold readers' interest and allow for successful mastery, understanding, and enjoyment of reading about Ethic Hackers. Clear, full-color photographs with captions provide additional accessible information. A table of contents, glossary...
6) GDPR
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
[2020]
Language
English
Description
This guide provides simple steps to help you comply with the GDPR, the General Data Protection Regulation, a set of rules you need to follow if your business has any dealings with EU countries or if you are established in the EU.
Author
Publisher
No Starch Press
Pub. Date
[2020]
Language
English
Description
"Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--
Publisher
Syngress
Pub. Date
©2006
Language
English
Description
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point. One of the most complicated areas of network technology is designing, planning, implementing, and constantly maintaining a demilitarized zone (DMZ) segment. This book is divided into four logical parts. First the reader will learn the concepts and...
10) IT operations
Publisher
Gale
Pub. Date
uuuu
Language
English
Description
Gale Presents: Udemy is an online learning platform that provides instruction for adults who want to upskill for a new job, advance in their current profession, or deepen a personal interest. This top collection, curated from courses from Udemy.com and powered by Udemy for Business, gives users access to relevant skills training, helping them achieve success at work and in life. Before enrolling, users can review key information about a course, its...
Author
Series
Publisher
For Dummies, a Wiley brand
Pub. Date
[2024]
Language
English
Description
"CCSP certification is one of the most sought-after credentials in IT sercurity. It's also tough to achieve. This trusted resource gives you detailed, easy-to-follow explanations of each of the six knowledge domains you'll enounter on the CCSP exam. In classic Dummies fashion, this book is chock full of tips and hacks for succeeding on the exam. Plus, you'll get two practice tests and 100+ flashcards online, so you can sail through test day." --
Author
Publisher
Published for Microsoft Corporation by Pearson Edcation, Inc
Pub. Date
[2020]
Language
English
Description
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key operational scenarios. You'll walk through securing any Azure workload, and optimizing key facets of modern security,...
Publisher
Gale
Pub. Date
uuuu
Language
English
Description
Gale Presents: Udemy is an online learning platform that provides instruction for adults who want to upskill for a new job, advance in their current profession, or deepen a personal interest. This top collection, curated from courses from Udemy.com and powered by Udemy for Business, gives users access to relevant skills training, helping them achieve success at work and in life. Before enrolling, users can review key information about a course, its...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Publisher
Uczelnia Łazarskiego
Pub. Date
2024.
Language
Polish
Description
"The book is devoted to the security of electronic communications networks and services. This issue is analyzed primarily from the regulatory aspect. The provisions of both European Union and Polish law are discussed. National regulations in the field of cybersecurity are based on EU regulations. Therefore, the work presents the provisions of the directive of December 14, 2022 on measures for a high common level of cybersecurity in the territory of...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
18) Corsair
Author
Publisher
Tor
Pub. Date
2015.
Language
English
Description
"In the early 2020s, two young, genius computer hackers, Elizabeth Santiago and David Schwartz, meet at MIT, where Schwartz is sneaking into classes, and have a brief affair. David is amoral and out for himself, and soon disappears. Elizabeth dreams of technology and space travel and takes a military job after graduating. Nearly ten years later, David is setting himself to become a billionaire by working in the shadows under a multiplicity of names...