Catalog Search Results
Author
Language
English
Description
How Not to Get Phished equips you with the knowledge and tools to:Unmask the tactics phishers use to steal your information and money.Become a cybersecurity sleuth,sharpening your eye to spot red flags and avoid falling victim.Build a fortress around your accounts with essential security practices.Navigate the digital world confidently with proactive online habits.Respond effectively if you suspect you've been phished, minimizing damage and recovering...
Author
Language
English
Description
Get the Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier in 20 minutes. Please note: This is a summary & not the original book. "The Hacker Crackdown" delves into the complex world of hackers, law enforcement, and the telecommunications industry, set against the backdrop of a major AT&T network failure in 1990. The book explores the historical development of telephone technology, from Alexander Graham Bell's...
Author
Language
English
Description
Welcome to our captivating guide on the world of malware. In this exploration, we uncover the dark secrets of viruses, Trojans, ransomware, spyware, rootkits, and spam. With gripping real-life examples, we delve into their sinister traits, destructive impacts, and powerful prevention strategies. By immersing ourselves in this knowledge, we empower ourselves to safeguard against these digital predators and forge a secure digital landscape. Get ready...
Author
Language
English
Description
Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Language
English
Description
Empower Your Digital Shield with Splunk Expertise!
Book Description
The Ultimate Splunk for Cybersecurity is your practical companion to utilizing Splunk for threat detection and security operations.
This in-depth guide begins with an introduction to Splunk and its role in cybersecurity, followed by a detailed discussion on configuring inputs and data sources, understanding Splunk architecture, and using Splunk Enterprise Security (ES).
It...
Author
Language
English
Description
Millions of normal people fall prey to cyberattacks, scams, malware, and ransomware every year, and it's only getting worse.
The importance of cybersecurity cannot be overstated. Cybercriminals are constantly finding new ways to exploit vulnerabilities in computer systems and networks. They use a variety of tactics, including phishing scams, malware, and ransomware, to gain access to sensitive data and steal personal information.
Cyber attacks...
Author
Language
English
Description
In our interconnected world, where information flows seamlessly across networks and systems, safeguarding digital assets has become an imperative. "Fortifying Digital Fortress: A Comprehensive Guide to Information Systems Security" is a comprehensive exploration of strategies, methodologies, and best practices that organizations and individuals can adopt to protect their information systems from ever-evolving cyber threats. This book provides a holistic...
Author
Language
English
Description
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!
Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your comprehensive guide to mastering the art of cyber defense and infrastructure security.
���� BOOK 1 - CYBERWATCH: A BEGINNER'S GUIDE TO DIGITAL SECURITY: Get started on your cybersecurity journey...
Author
Language
English
Description
In "Hack the Airwaves," Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth Low Energy (BLE) security. As BLE devices become increasingly integrated into our daily lives, the potential for vulnerabilities and threats grows exponentially. This comprehensive guide is designed for hackers, red team operators, pentesters, and other cybersecurity practitioners who seek both a foundational understanding and advanced...
Author
Language
English
Description
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into the fascinating field of cybersecurity, illuminating the many prospects, difficulties, and routes to success in this highly sought-after profession. Because businesses, governments, and individuals rely on the security of their digital assets and data, cybersecurity...
Author
Language
English
Description
Introducing the "Zero Trust Security" Book Bundle: Building Cyber Resilience & Robust Security Postures!
In an age of digital transformation, securing your digital world has never been more crucial. The "Zero Trust Security" book bundle is your comprehensive guide to revolutionize your cybersecurity strategies, from beginners to seasoned experts.
Book 1-Zero Trust Security: A Beginner's Guide to Building Cyber Resilience: Discover the foundational...
Author
Language
English
Description
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! ����
Are you ready to master the art of ethical hacking and become a formidable defender of the digital realm? Look no further! Dive into the world of cybersecurity with our comprehensive book bundle, "Cyber Auditing Unleashed." This four-book collection is your ticket to advanced security auditing, providing you...
15) Burp Suite
Author
Language
English
Description
Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!
Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!
What's Inside:
���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to...
Author
Language
English
Description
Unlock the Power of Blue Team Defense!
���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity Solution
Are you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers...
Author
Language
English
Description
Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click....
Author
Language
English
Description
Unlock the Secrets of Malware with "Malware Reverse Engineering: Cracking the Code" - Your Comprehensive Guide to Cybersecurity
Are you ready to embark on a transformative journey into the world of cybersecurity and malware reverse engineering? Look no further than our book bundle, "Malware Reverse Engineering: Cracking the Code." This carefully curated collection spans four volumes, each designed to cater to your expertise level, from beginners...
Author
Language
English
Description
Throughout this series, I discussed definitive insights and themes in The Psychology of Insider Threat Prevention Cyber Security that can prepare the ITP CS Specialist to become more aware and cautious about the genius of the ordinary malicious insider. Malicious insiders are not often stupid. They are most often very smart people who do stupid things. The dangerous challenge occurs when brilliant people launch malicious insider attacks brilliantly....
Author
Language
English
Description
"The Invisible Hand" delves deep into the clandestine world of economic intelligence and industrial espionage, where the forces shaping global economies are often unseen and unknown.In this riveting exploration, author Davis Truman unveils the intricate web of intrigue that underpins modern capitalism. From covert operations to sophisticated cyber-espionage, this book reveals how nations and corporations deploy their resources relentlessly for competitive...
Borrow from another library
Didn't find what you need? Items not owned by Darien Library can be requested from other libraries via our interlibrary loan system (ILL).