Catalog Search Results
Author
Publisher
Apress
Pub. Date
[2016]
Physical Desc
1 online resource (1 volume)
Language
English
Description
This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general. Buildings today are automated because the systems...
Author
Publisher
Packt Publishing, Limited
Pub. Date
2022.
Physical Desc
1 online resource (246 pages)
Language
English
Description
Build and mature a threat hunting team capable of repeatably stalking and trapping advanced adversaries in the darkest parts of an enterprise Key Features Learn foundational concepts for effective threat hunting teams in pursuit of cyber adversaries Recognize processes and requirements for executing and conducting a hunt Customize a defensive cyber framework needed to grow and mature a hunt team Book Description Threat hunting is a concept that takes...
Author
Pub. Date
2011.
Language
English
Formats
Description
"Aaron Elkins has been hailed as "a master" (The Dallas Morning News) for his Edgar Award-winning Gideon Oliver mysteries. Now, in an original new novel, he illustrates how quickly everything can go wrong when you ask: What's the worst that can happen? For Bryan Bennett, designing hostage negotiation programs is the perfect job--as long as he keeps a safe, theoretical distance. What he can't do is deal directly with kidnappers or their victims, as...
Author
Publisher
O'Reilly Media, Inc
Pub. Date
2022.
Edition
First edition.
Physical Desc
1 online resource (40 pages) : color illustrations
Language
English
Description
How packages are built, sourced, and integrated is vital to efficient and secure supply chains. Complete control over packages, from provenance to deployment, is critical for security during the software development lifecycle. As recent breaches attest, securing your software supply chain is now more critical than ever. What can you do? Simple package management strategies are not enough. You need a single source of truth for dependencies that you...
Publisher
Syngress
Pub. Date
2013
Physical Desc
1 online resource
Language
English
Description
This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly...
Author
Publisher
Apress L. P
Pub. Date
2022
Physical Desc
1 online resource (153 p.)
Language
English
Description
Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon–or should be employing–in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments,...
Author
Series
Language
English
Description
Keep your Mac safe from intruders, malware, and more! Version 1.0.1, updated February 10, 2021 Secure your Mac against attacks from the internet and physical intrusion with the greatest of ease. Glenn Fleishman guides you through configuring your Mac to protect against phishing, malware, network intrusion, social engineering, and invaders who might tap physically into your computer. Glenn teaches how to secure your data at rest and in motion. Learn...
Publisher
Packt Publishing
Pub. Date
2023.
Edition
[First edition].
Physical Desc
1 online resource (1 video file (2 hr., 1 min.)) : sound, color.
Language
English
Description
LLMs introduce new attack vectors that can compromise your AI systems. This intensive workshop equips you with hands-on skills to tackle the OWASP Top 10 most critical risks for securing enterprise-grade LLM applications. Led by cybersecurity expert Clint Bodungen, this masterclass focuses on fortifying your LLM stack against the OWASP Top 10 most critical risks. Diving deep into the attack vectors unique to these powerful generative models, you will...
Author
Publisher
John Wiley & Sons, Inc
Pub. Date
[2024]
Physical Desc
1 online resource (xiv, 274 pages) : illustrations, maps
Language
English
Description
"In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection, how to protect it, and the consequences of failure. Through the book, you'll examine the intersection of cybersecurity, climate change, and sustainability as you reconsider and reexamine the resilience of your infrastructure systems"--
Author
Pub. Date
2023.
Language
English
Formats
Description
Ensure compliance across the top cloud players by diving into AWS, Azure, and GCP cloud auditing to minimize security risks Key Features Leverage best practices and emerging technologies to effectively audit a cloud environment Get better at auditing and unlock career opportunities in cloud audits and compliance Explore multiple assessments of various features in a cloud environment to see how it's done Book Description As more and more companies...
Publisher
Gale
Pub. Date
uuuu
Language
English
Description
Gale Presents: Udemy is an online learning platform that provides instruction for adults who want to upskill for a new job, advance in their current profession, or deepen a personal interest. This top collection, curated from courses from Udemy.com and powered by Udemy for Business, gives users access to relevant skills training, helping them achieve success at work and in life. Before enrolling, users can review key information about a course, its...
Author
Edition
[First edition].
Language
English
Formats
Description
With cyberattacks on the rise, it has become essential for C-suite executives and board members to step up and collectively recognize cyber risk as a top priority business risk. However, non-cyber executives find it challenging to understand their role in increasing the business's cyber resilience due to its complex nature and the lack of a clear return on investment. This book demystifies the perception that cybersecurity is a technical problem,...
Publisher
ISTE, Ltd
Pub. Date
2022.
Physical Desc
1 online resource.
Language
English
Description
Today, more than 80% of the data transmitted over networks and archived on our computers, tablets, cell phones or clouds is multimedia data - images, videos, audio, 3D data. The applications of this data range from video games to healthcare, and include computer-aided design, video surveillance and biometrics. It is becoming increasingly urgent to secure this data, not only during transmission and archiving, but also during its retrieval and use....
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase