165 Results
165 Results
CISSP practice exams —Harris, Shon, author.
Book
2016
1 available of 2 items

Hands on hacking : become an expert at next gen penetration testing and purple teaming —Hickey, Matthew (Computer security expert), author.
Book
2020
2 available of 3 items

Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years o...

Penetration testing for dummies —Shimonski, Robert, author.
Book
2020
1 available of 2 items

Target, test, analyze, and report on security vulnerabilities with pen testing. Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to b...

Cybersecurity for dummies —Steinberg, Joseph (Cybersecurity expert), author.
Book
2020
8 available of 8 items

Protecting your business and family against cyber attacks! If keeping your business or your family safe from Cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of beco...

Tribe of hackers : security leaders : tribal knowledge from the best in cybersecurity leadership —Carey, Marcus J. (Cybersecurity professional), author.
Book
2020
1 available of 1 items

"The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security spe...

Beginning security with Microsoft technologies : protecting Office 365, devices, and data —Lakshmi, Vasantha, author.
Book
2019
1 available of 1 items

"Secure and manage your Azure cloud infrastructure, Office 365, and SaaS-based applications and devices. This book focuses on security in the Azure cloud, covering aspects such as identity protection in Azure AD, network...

My online privacy for seniors —Rich, Jason, author.
Book
2019
7 available of 7 items

The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats —Clarke, Richard A. (Richard Alan), 1951- author.
Book
2019
1 available of 1 items

"There is much to fear in the dark corners of cyberspace. From well-covered stories like the Stuxnet attack which helped slow Iran's nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that clo...

The sentinel —Child, Lee, author.
Book
2020
15 available of 92 items

"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet ...

The sentinel —Child, Lee, author.
Book On CD
2020
7 available of 12 items

"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet ...

Digital fortress —Brown, Dan, 1964- author.
Book
2004
39 available of 39 items

Attack protocol : a novel —Preisler, Jerome, author.
Book
2020
29 available of 34 items

In the wake of stunning terrorist attacks around the world, Net Force jumps into action. The president's new cybersecurity agency homes in on a dangerous figure operating in the shadows of the Carpathian mountains. And h...

200+ ways to protect your privacy : simple ways to prevent hacks and protect your privacy--on and offline —Rogers, Jeni, author.
Book
2019
4 available of 8 items

"We all know that the Internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that ...

Falcon —Kendig, Ronie, author.
Book
2015
4 available of 5 items

Special Forces operator Salvatore "Falcon" Russo vowed to never again speak to or trust Lieutenant Cassandra Walker after a tragedy four years ago. But as Raptor closes in on the cyber terrorists responsible for killing ...

Technocreep : the surrender of privacy and the capitalization of intimacy —Keenan, Thomas P.
Book
2014
4 available of 4 items

Technology is rapidly moving into our bodies, writes cyber expert Keenan, and this book gives a chilling look ahead into where that road may lead us - on a one way trip to the total surrender of privacy and the commoditi...

Hacking for dummies —Beaver, Kevin, author.
Book
2018
1 available of 2 items

1 2 3 ...