Catalog Search Results
81) Snot, sneezes, and super-spreaders: everything you need to know about viruses and how to stop them
Author
Pub. Date
2022.
Language
English
Formats
Description
"f we didn't know it before, we certainly know it now: Viruses can be powerful-so powerful, in fact, that they can hold the world in their grip for months at a time. But what exactly is a virus? Where do they come from and what do they do to our bodies? How do they spread, and what can we do to protect ourselves? Author Marc ter Horst tackles these questions with playfulness and humor, while Wendy Panders' quirky and enlightening illustrations bring...
82) The last shadow
Author
Series
Language
English
Formats
Description
"Orson Scott Card's The Last Shadow is the long-awaited conclusion to both the original Ender series and the Ender's Shadow series, as the children of Ender and Bean solve the great problem of the Ender Universe-the deadly virus they call the descolada, which is incurable and will kill all of humanity if it were allowed to escape from Lusitania. One planet. Three sapient species living peacefully together. And one deadly virus that could wipe out...
83) Stop the germs!
Author
Series
Language
English
Formats
Description
"Yuck, germs! Germs can make us sick. How do we stay healthy? With engaging text and colorful photos, readers find out how to keep the germs away. Stop the Germs! includes a glossary, read more section, kid-friendly Internet sites, and an index"--
Author
Language
English
Description
This is not your regular hacking book.
Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform. The kind of vulnerabilities you find in every corporate environment around the world: • Bypassing application whitelisting • Privilege escalation • Pivoting on other machines. It's up to you to exploit them in a meaningful way without screwing...
Author
Language
English
Description
Welcome to our captivating guide on the world of malware. In this exploration, we uncover the dark secrets of viruses, Trojans, ransomware, spyware, rootkits, and spam. With gripping real-life examples, we delve into their sinister traits, destructive impacts, and powerful prevention strategies. By immersing ourselves in this knowledge, we empower ourselves to safeguard against these digital predators and forge a secure digital landscape. Get ready...
Author
Language
English
Description
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones, protected with ironclad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your...
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Language
English
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Language
English
Description
Hacking Network Protocols: Unlocking the Secrets of Network Protocol Analysis" is a comprehensive guide to understanding the vulnerabilities and defenses of network protocols. In today's interconnected world, networks are essential for communication and collaboration, making them a prime target for hackers seeking to exploit vulnerabilities in the protocols that underpin them. This book provides a detailed overview of network protocols, including...
Author
Language
English
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Language
English
Description
Introducing the "Wireless Security Masterclass" Book Bundle - Your Path to Becoming a Wireless Security Expert!
���� Are you concerned about the security of your wireless networks? ���� Want to learn the ins and outs of penetration testing and ethical hacking? ���� Seeking a comprehensive resource to master wireless security from beginner to expert level?
Look no further! Our "Wireless Security Masterclass" book bundle is...
Author
Language
English
Description
What every current and aspiring cyber security leader and professional needs to know to become truly exceptional. Bridging the gap between business and cyber security. Actionable rules to maximise value from cyber security and address cyber threats. Differentiating skills for professional excellence and massive career success. In a hyperconnected world powered by technology, the importance of cyber security to our collective prosperity and progress...
Author
Language
English
Description
The Ransomware Handbook is an essential read for anyone wishing to learn about ransomware attacks. Mike thoroughly examines the essence of what ransomware is, the current trends within ransomware, and how to protect your organization from this modern threat. The book gives data driven insights on the trends within ransomware, such as the rise of the demanded sums of money and the likelihood of companies retrieving their data.
The Ransomware Handbook...
Author
Language
Español
Description
Originalmente, el término "hacker" se refería a un programador experto en sistemas operativos de computadoras y código de máquina. Hoy, se refiere a cualquiera que realice actividades de piratería o piratería. La piratería es el acto de cambiar las características de un sistema para lograr un objetivo que no está dentro del propósito original del creador. La palabra "piratería" generalmente se percibe negativamente, especialmente por personas...
Author
Series
Language
English
Description
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.
Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.
We...
98) Modern Cybersecurity Strategies for Enterprises: Protect and Secure Your Enterprise Networks, Digita
Author
Language
English
Description
Security is a shared responsibility, and we must all own it
KEY FEATURES ● Expert-led instructions on the pillars of a secure corporate infrastructure and identifying critical components.● Provides Cybersecurity strategy templates, best practices, and recommendations presented with diagrams.● Adopts a perspective of developing a Cybersecurity strategy that aligns with business goals.
DESCRIPTION Once a business is connected to the Internet,...
Author
Series
Language
English
Description
This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors...
Author
Language
English
Description
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed, they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles, you want the best measures you can afford. But, you need to operate with the assumption that Prevention and Detection will eventually...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request