Catalog Search Results
Author
Pub. Date
2014
Physical Desc
1 online resource (xx, 426 pages : illustrations)
Language
English
Description
"Maximize the powerful tools and features of the industry-leading digital investigation software. Computer Forensics and Digital Investigation with EnCase Forensic reveals, step by step, how to detect illicit activity, capture and verify evidence, recover deleted and encrypted artifacts, prepare court-ready documents, and ensure legal and regulatory compliance. The book illustrates each concept using downloadable evidence from the National Institute...
Author
Pub. Date
2014
Physical Desc
1 online resource (xxi, 601 pages : illustrations)
Language
English
Description
The all-new edition of this security bestseller reveals the most relevant and up-to-date incident response techniques, tools, and case scenarios. Incident Response & Computer Forensics, Third Edition arms you with the right know-how to react quickly and efficiently to the daily onslaught of data breaches that hit all organizations worldwide. This new edition is chock-full of updates about tools and techniques as well as real-world scenarios reflecting...
Author
Publisher
McGraw-Hill Education
Pub. Date
[2016]
Physical Desc
1 online resource
Language
English
Description
This in-depth guide reveals the art of mobile forensics investigation with comprehensive coverage of the entire mobile forensics investigation lifecycle, from evidence collection through advanced data analysis to reporting and presenting findings. Mobile Forensics Investigation: A Guide to Evidence Collection, Analysis, and Presentation leads examiners through the mobile forensics investigation process, from isolation and seizure of devices, to evidence...
Author
Language
English
Appears on list
Formats
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 22 min.) : digital, .flv file, sound
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 33 min.) : digital, .flv file, sound
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Author
Series
Geronimo Stilton. Original series volume 68
Accelerated Reader
IL: MG - BL: 4.2 - AR Pts: 1
Language
English
Formats
Description
When Geronimo discovers someone has stolen his identity, he enlists Professor Margo Bitmouse, a well-known computer expert, to help him track down the thief.
Author
Language
English
Formats
Description
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side. Criminals are often the earliest, and most innovative, adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and erasing computer servers. It's disturbingly easy to activate baby monitors to spy on families, to hack pacemakers to deliver a lethal jolt of electricity,...
Author
Series
Accelerated Reader
IL: MG - BL: 7.3 - AR Pts: 1
Language
English
Formats
Description
"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This intriguing book will captivate readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security."--
12) Version zero
Author
Language
English
Formats
Description
"Max, a data whiz at the social media company Wren, has gotten a firsthand glimpse of the dark side of big tech. When he questions what his company does with the data they collect, he's fired...then black-balled across Silicon Valley. With time on his hands and revenge on his mind, Max and his longtime friend (and secretly the love of his life) Akiko, decide to get even by rebooting the internet. After all, in order to fix things, sometimes you have...
Author
Publisher
McGraw-Hill Education
Pub. Date
[2016]
Physical Desc
1 online resource (xxiii, 391 pages : illustrations)
Language
English
Description
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile element of information security-humans People-Centric Security: Transforming Your Enterprise Security Culture addresses the urgent need for change at the intersection of people and security. Esentially a complete security culture toolkit, this comprehensive resource provides you with a blueprint for assessing, designing, building, and maintaining...
Publisher
Kanopy Streaming
Pub. Date
2015.
Physical Desc
1 online resource (1 video file, approximately 57 minutes) : digital, .flv file, sound
Language
English
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
15) Hidden agendas
Author
Series
Accelerated Reader
IL: UG - BL: 5.7 - AR Pts: 16
Language
English
Formats
Description
In the year 2010, computers are the new superpower. Those who control them control the world. To enforce the New Laws, Congress creates the ultimate computer security agency with the FBI: the Net Force.
Instructions on how to make a bomb...a list of every U.S. spy in the Euro-Asian theater...Someone with access to classified information is posting it on the Internet-and it's costing lives. Net Force Commander Alex Michaels is in the hot seat. Now,
...16) Wildcard
Author
Series
Warcross volume 2
Accelerated Reader
IL: UG - BL: 5.6 - AR Pts: 15
Lexile measure
810L
Language
English
Appears on list
Formats
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
17) Warcross
Author
Series
Warcross volume 1
Accelerated Reader
IL: UG - BL: 5.6 - AR Pts: 16
Language
English
Appears on these lists
Formats
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
Author
Pub. Date
2013
Physical Desc
1 online resource (xxvii, 289 pages)
Language
English
Description
"Identify and evade key threats across the expanding mobile risk landscape. Hacking Exposed Mobile : Security Secrets & Solutions covers the wide range of attacks to your mobile deployment alongside ready-to-use countermeasures. Find out how attackers compromise networks and devices, attack mobile services, and subvert mobile apps. Learn how to encrypt mobile data, fortify mobile platforms, and eradicate malware. This cutting-edge guide reveals secure...
Author
Publisher
McGraw-Hill Education
Pub. Date
[2017]
Physical Desc
1 online resource (1 volume) : illustrations
Language
English
Description
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against...
20) Cybercrime
Author
Series
Accelerated Reader
IL: MG - BL: 5.7 - AR Pts: 1
Lexile measure
800L
Language
English
Formats
Description
Computer networks allow people to easily share information. Organizations and entire cities rely on computer networks. Hackers can break into networks to disrupt systems or steal data. Hacking and other cybercrimes are on the rise. Cybercrime explores common cybercrimes and how people can guard against these threats.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request