Catalog Search Results
1) The sentinel
Author
Series
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
2) Zero days
Author
Pub. Date
2023.
Language
English
Description
Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Publisher
Wiley
Pub. Date
[2016]
Language
English
Description
Linux Server Security: Hack and Defend presents a detailed guide for experienced administrators, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment, this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online...
Author
Publisher
Bloomsbury
Pub. Date
2015.
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Author
Publisher
Wiley Publishing, Inc
Pub. Date
[2002]
Language
English
Description
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems...
Author
Language
English
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Publisher
Cisco Press
Pub. Date
c2004.
Language
English
Description
In 'Designing Network Security' Merike Kaeo enables readers to gain a comprehensive view of network security issues and concepts, then goes on to show how specific implementations based on individual network needs can be mastered.
Author
Series
Publisher
Core Library, an imprint of Abdo Publishing
Pub. Date
[2020]
Language
English
Description
Personal data is data about people. Researchers collect personal data to learn more about populations. Companies collect personal data online to help sell their products. Personal Data Collection explores the debate about the collection and use of personal data.
Author
Language
English
Description
This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a...
Author
Publisher
Little, Brown and Company
Pub. Date
2017.
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
Author
Publisher
Altea
Pub. Date
[2015]
Language
Español
Description
Utilizando ejemplos de la cultura popular, describe siete formas en que las personas pueden ponerse en peligro al usar las redes sociales y brinda consejos para prevenir estas situaciones, recuperarse de ellas si ocurren y usar las redes de manera segura.
Using examples from popular culture, outlines seven ways in which people may endanger themselves while using social media, and provides advice for preventing these situations, recovering from them...
Author
Publisher
No Starch Press
Pub. Date
[2019]
Language
English
Description
"Uses real-world bug reports (vulnerabilities in software or in this case web applications) to teach programmers and InfoSec professionals how to discover and protect vulnerabilities in web applications. Real-World Bug Hunting is a field guide to finding software bugs. Ethical hacker Peter Yaworski breaks down common types of bugs, then contextualizes them with real bug bounty reports released by hackers on companies like Twitter, Facebook, Google,...
Author
Language
English
Description
"The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location,...
19) The cipher
Author
Publisher
Speak an imprint of Penguin Random House LLC
Pub. Date
2015.
Language
English
Description
Robert "Smiles" Smylie and his friend Ben become embroiled in a high-stakes negotiation with a pair of suspicious Feds when Ben cracks a code with the power to unlock all the Internet's secrets.
Author
Publisher
Doubleday
Pub. Date
[2015]
Language
English
Description
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side. Criminals are often the earliest, and most innovative, adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and erasing computer servers. It's disturbingly easy to activate baby monitors to spy on families, to hack pacemakers to deliver a lethal jolt of electricity,...
In Interlibrary Loan
Didn't find what you need? Items not owned by Orem Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. NOTE: WILL REQUIRE A POSTAGE FEE
Didn't find it?
Can't find what you are looking for? You can put in a request for us to add it to the collection. Submit Request