Catalog Search Results
Author
Pub. Date
[2020]
Language
English
Description
A collection of invaluable real-world insights from the world's leading cybersecurity experts offering perspectives on cybersecurity blue team issues including how to learn and practice blue team skills, how to communicate with and manage non-technical executive expectations, and where to start if you're rebuilding from a primitive security infrastructure.
Pub. Date
[2014]
Language
English
Description
There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with "white-hat" hackers, who guard your online security. But their opponents, the "black-hat" hackers, have an interest in an unsecure internet, and sell security leaks to the highest bidder. They are the...
Pub. Date
[2012], c2010
Language
English
Description
Technological development has brought about unprecedented means of gathering and disseminating information. But have these advancements made the protection of personal and organizational privacy virtually impossible? In this video, Damien Smith, lawyer and governance expert, illustrates why privacy systems fail and offers strategies for mitigating the risks posed by the "privacy invasion." Topics covered include the "incremental creep" of privacy...
5) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Pub. Date
[2012], c2011
Language
English
Description
With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the Australian Web site Seek serving as a case study. Seek's security...
Pub. Date
[2013], c2011
Language
English
Description
The term once suggested a lone troublemaker in search of attention and self-enrichment, but today, "hacker" might also mean a covert foot soldier in the service of his or her country - put to work in top-secret quarters and backed by budgets that exceed hundreds of millions of dollars. This film looks at the kind of combat for which skilled hackers are recruited and which they often pursue with every bit of energy and resourcefulness asked of more...
Pub. Date
[2013], c2008
Language
English
Description
Piracy is having significant financial impacts on the music, video game, and software industries. Piracy is also affecting the type of music that is being produced and limiting the amount of software available to the public. This program looks at Internet piracy, covering use of copyrighted information, software copyright law, the facts and figures surrounding piracy, and respect of intellectual property. Industry professionals and musicians alike...
14) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
#1 NEW YORK TIMES BESTSELLER Jack Reacher is back! The utterly addictive (The New York Times) series continues as acclaimed author Lee Child teams up with his brother, Andrew Child, fellow thriller writer extraordinaire. One of the many great things about Jack Reacher is that he s larger than life while remaining relatable and believable. The Sentinel shows that two Childs are even better than one. James Patterson As always, Reacher has no particular...
15) Zero days
Author
Pub. Date
2023.
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Pub. Date
[2014], c2013
Language
English
Description
This film explores the murky and fast-paced world of hackers out to steal money and identities and wreak havoc with people's online lives, and the scientists who are joining forces to help defeat them. Horizon meets the two men who uncovered the world's first cyber weapon, the pioneers of what is called ultra paranoid computing, and the computer expert who worked out how to hack into cash machines.
Author
Language
English
Description
As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power...
Series
Pub. Date
[2014]
Language
English
Description
The year 2013 was very bad for big business. In February $45 million was stolen from ATMs around the world after cyber criminals hacked credit cards and gave them unlimited withdrawal limits. Then, in November, 40 million credit card numbers were removed from the point-of-sale terminals of U.S. retailer Target. Ben Hammersley travels to New York and Washington D.C. to look at how crime has evolved, forensically examining the many ranks and roles of...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request