Catalog Search Results
Publisher
Kanopy Streaming
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Series
Language
English
Description
"A decorated former Air Force pilot. A pregnant flight attendant. A dedicated TSA agent. The fates of these three, and many others, converge in Danielle Steel's gripping new novel--a heart-stopping thriller that engagesordinary men and women in the fight of their lives during a flight from New York to San Francisco. On a beautiful May morning at New York's John F. Kennedy airport, two planes have just departed for San Francisco--one a 757, another...
Publisher
Kanopy Streaming
Language
English
Description
Our lives are going digital. We shop, bank and even date online. Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious — and cybercriminals want it. Now, NOVA goes behind the scenes of the fast-paced world of cryptography to meet the scientists battling to keep our data safe. They are experts in extreme physics, math and a new field called “ultra-paranoid computing,” all working...
Publisher
Kanopy Streaming
Language
English
Description
This program will show you recommended ways of handling difficult situations that your library and staff may encounter. Among the issues covered are potentially violent patrons, bomb threats, sexual harassment, and inappropriate Internet browsing. "Highly recommended ..." - Video Librarian.
Publisher
Kanopy Streaming
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Language
English
Appears on list
Formats
Description
The first account of the events of September 11, 2012, when terrorists attacked the U.S. State Department Special Mission Compound and a nearby CIA station called the Annex in Benghazi, Libya. A team of six American security operators fought to repel the attackers and protect the Americans stationed there. Those men went beyond the call of duty, performing extraordinary acts of courage and heroism, to avert tragedy on a much larger scale. This is...
Author
Language
English
Formats
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
11) Flawless
Language
English
Formats
Description
Michael Radford (Il Postino and The Merchant of Venice) directs screenwriter Edward Anderson's script about an aging janitor and an American executive who form an unlikely alliance in order to carry out an elaborate jewel heist. Official Selection at the **SXSW Film Festival**.
12) Hype: how scammers, grifters, and con artists are taking over the internet--and why we're following
Author
Publisher
Hanover Square Press
Language
English
Appears on list
Description
Publisher Annotation: From former Vice journalist and executive producer of hit Netflix documentary Fyre comes an eye-opening look at the con artists, grifters and snake oil salesmen of the digital age-and why we can't stop falling for them. 352pp., 250K
Author
Publisher
John Wiley & Sons Inc
Language
English
Description
JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER
The Pentester BluePrint: Starting a Career as an Ethical Hacker offers listeners a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems,...
Author
Series
Hugo Marston novels volume 1
Publisher
Seventh Street Books
Language
English
Description
When his bookseller friend, a former Holocaust survivor and Nazi hunter, is kidnapped and other booksellers are murdered, Hugo Marston, head of security for the U.S. embassy in Paris, discovers a shocking conspiracy.
18) Cybersecurity
Author
Series
Language
English
Description
"Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too). You'll get step-by-step guidance on how to implement reasonable security...
Author
Publisher
Little, Brown and Company
Edition
First edition.
Language
English
Description
"Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand...Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions....
In Texas Group Catalog
Didn't find what you need? Items not owned by MetroShare Consortium can be requested from other Texas Group Catalog libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request