Catalog Search Results
Author
Series
Language
English
Description
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you &...
2) Zero days
Author
Pub. Date
2023.
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jacintha "Jack" Cross and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to...
Author
Publisher
Apress
Language
English
Description
Rely on this practical, end-to-end guide on cyber safety and privacy written expressly for a non-technical audience. You will have just what you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't know. Computers and the Internet have revolutionized the modern world, but if you are like most people, you have no clue how these things work and...
Author
Language
English
Description
The classic guide to information security-fully updated for the latest attacks and countermeasures Security in Computing, Third Edition systematically demonstrates how to control failures of confidentiality, integrity, and availability in applications, databases, operating systems, and networks alike. This sweeping revision of the field's classic guide to computer security reflects today's entirely new generation of network- and Internet-based threats...
Author
Publisher
Apress
Language
English
Description
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more advanced network services, web servers, and database servers and you will end by building your own web applications servers, including...
Author
Language
English
Description
This book deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours. It will give readers the founding principles around information security assessments and why they are important, whilst providing a fluid framework for developing an astute 'information security mind' capable of rapid adaptation to evolving technologies, markets, regulations, and laws.
Author
Publisher
Syngress
Language
English
Description
There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP, you will learn how to properly secure your database, from both...
Author
Language
Deutsch
Description
Penetrationstests mit Metasploit als effektiver Teil der IT-Sicherheitsstrategie Der komplette Workflow: Portscanning mit Nmap, Hacking mit Metasploit, Schwachstellen scannen mit Nessus Die Techniken der Angreifer verstehen und geeignete Gegenmaßnahmen ergreifen Metasploit ist ein mächtiges Werkzeug, mit dem auch unerfahrene Administratoren gängige Angriffsmethoden verstehen und nachstellen können. Der Autor erklärt das Framework dabei nicht...
Author
Publisher
Que
Language
English
Description
Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
Author
Publisher
Syngress
Language
English
Description
Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that...
Author
Series
Publisher
Academic Press
Pub. Date
2012
Edition
1st ed.
Physical Desc
1 online resource (1 volume) : illustrations.
Language
English
Description
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses...
Author
Pub. Date
2011.
Language
English
Formats
Description
The top-secret world that the government created in response to the 9/11 terrorist attacks has become so enormous, so unwieldy, and so secretive that no one knows how much money it costs, how many people it employs or exactly how many agencies duplicate work being done elsewhere. The result is that the system put in place to keep the United States safe may be putting us in greater danger. In Top Secret America, award-winning reporters Dana Priest...
Author
Language
English
Formats
Description
Explore the latest developments in cybersecurity with this essential guide Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too)....
15) King and Maxwell
Author
Series
Pub. Date
2013.
Language
English
Description
The teenage son of an U.S. MIA in Afghanistan hires Sean King and Michelle Maxwell--former Secret Service agents turned private investigators--to solve the mystery surrounding his father. But their investigation quickly leads to deeper, more troubling questions. Could Tyler's father really still be alive? What was his true mission? Could Tyler be the next target?
Author
Publisher
Wiley
Pub. Date
[2019]
Physical Desc
1 online resource (xxiv, 262 pages)
Language
English
Description
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching...
Author
Publisher
Wiley
Pub. Date
2014
Physical Desc
1 online resource
Language
English
Description
Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful? data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a...
Author
Publisher
Apress
Pub. Date
2019.
Physical Desc
1 online resource
Language
English
Description
Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical...
Author
Publisher
Apress
Pub. Date
2018.
Physical Desc
1 online resource
Language
English
Description
Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other...
Author
Publisher
Apress
Pub. Date
[2020]
Physical Desc
1 online resource (xix, 164 pages) : illustrations
Language
English
Description
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in todays world exists within or connected to cyberspace,...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase