Catalog Search Results
3) Hacktivism
Series
Reference shelf volume 95, number 2
Publisher
EBSCO Information Services, Inc
Pub. Date
[2023]
Language
English
Description
Explores recent events and controversies in the world of hacktivism, from cyberattacks by Anonymous on Russian computer systems after the invasion of Ukraine to the doxing of Supreme Court justices by pro-choice group Ruth Sent Us.
Author
Series
Publisher
New York University Press
Pub. Date
[2016]
Language
English
Description
Public discourse, from pop culture to political rhetoric, portrays the figure of the hacker distinctly: a deceptive, digital villain. But what do we actually know about hackers? In Hacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and...
Author
Language
English
Formats
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Author
Publisher
BenBella Books
Pub. Date
2021.
Language
English
Description
"From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection"-- Provided by publisher.
Author
Publisher
Bloomsbury
Pub. Date
2015.
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Author
Series
Publisher
Berkley Books
Pub. Date
[1999]
Language
English
Description
The Net Force computer security agency goes into action when someone with access to highly classified information begins to post top-secret data on the Internet, while, at the same time, a lethal computer virus is wreaking havoc on the federal financial systems.
Author
Series
Rocky Mountain courage volume 3
Language
English
Formats
Description
Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. When a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and hopefully save lives. Diplomatic Security Services special agent Alex...
17) RANSOMWARE HUNTING TEAM: a band of misfits improbable crusade to save the world from... cybercrime
Author
Publisher
PICADOR
Pub. Date
2023.
Language
English
19) Constant fear
Author
Pub. Date
2015.
Language
English
Formats
Description
A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds.
When a drunk-driving accident ruined his life, only a popular survivalist blog helped to restore Jake's sense of control. He's become an avid Doomsday Prepper, raising his diabetic son, Andy, to be ready for any sudden catastrophe. Jake works as a custodian at isolated Pepperell Academy...
Author
Series
Publisher
Crabtree Publishing Company
Pub. Date
[2019]
Language
English
Description
"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This intriguing book will captivate readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security."-- Provided by publisher.
Didn't find it?
Can't find what you are looking for? Make a purchase suggestion. Submit Request