Catalog Search Results
1) The sentinel
Author
Series
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
2) Zero days
Author
Pub. Date
2023.
Language
English
Description
Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Publisher
Wiley
Pub. Date
[2016]
Language
English
Description
Linux Server Security: Hack and Defend presents a detailed guide for experienced administrators, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment, this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online...
4) Sneakers
Publisher
Universal Studios
Pub. Date
[2003]
Language
English
Description
Computer expert Martin Bishop heads a team of renegade hackers--including a former CIA employee, a gadgets wizard, a young genius, and a blind soundman who are routinely hired to test security systems.
Author
Publisher
Bloomsbury
Pub. Date
2015.
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Author
Publisher
Wiley Publishing, Inc
Pub. Date
[2002]
Language
English
Description
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems...
Publisher
PBS DVD Video
Pub. Date
c2003.
Language
English
Description
The Slammer hit on Super Bowl Sunday. Nimda struck one week after 9/11. Code Red had ripped through the system that summer. Moonlight Maze moved from the Russian Academy of Science and into the U.S. Department of Defense. A new form of warfare has broken out and the battleground is cyberspace. With weapons like embedded malicious code, probes and pings, there are surgical strikes, reverse neutron bombs, and the potential for massive assaults aimed...
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
12) Sneakers
Publisher
Universal Studios Home Entertainment
Pub. Date
[2015]
Language
English
Description
Computer expert Martin Bishop heads a team of renegade hackers who are routinely hired to test security systems. When government agents blackmail the Sneakers' into carrying out a covert mission of tracking down a top-secret black box, Bishop's team find themselves embroiled in a dangerous operation. They make a stunning discovery; the device has the capability to decode all existing encryption systems around the world.
Author
Publisher
Cisco Press
Pub. Date
c2004.
Language
English
Description
In 'Designing Network Security' Merike Kaeo enables readers to gain a comprehensive view of network security issues and concepts, then goes on to show how specific implementations based on individual network needs can be mastered.
Author
Series
Publisher
Core Library, an imprint of Abdo Publishing
Pub. Date
[2020]
Language
English
Description
Personal data is data about people. Researchers collect personal data to learn more about populations. Companies collect personal data online to help sell their products. Personal Data Collection explores the debate about the collection and use of personal data.
Author
Language
English
Formats
Description
This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a...
Author
Publisher
Little, Brown and Company
Pub. Date
2017.
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Publisher
Altea
Pub. Date
[2015]
Language
Español
Description
Utilizando ejemplos de la cultura popular, describe siete formas en que las personas pueden ponerse en peligro al usar las redes sociales y brinda consejos para prevenir estas situaciones, recuperarse de ellas si ocurren y usar las redes de manera segura.
Using examples from popular culture, outlines seven ways in which people may endanger themselves while using social media, and provides advice for preventing these situations, recovering from them...
20) Zero days
Publisher
Magnolia Home Entertainment
Pub. Date
[2017]
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
In Interlibrary Loan
Didn't find what you need? Items not owned by Orem Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. NOTE: WILL REQUIRE A POSTAGE FEE
Didn't find it?
Can't find what you are looking for? You can put in a request for us to add it to the collection. Submit Request