Catalog Search Results
Author
Description
In a world where every technological advancement is interlinked, "Is Your Data Safe?" Cyberwarfare delves into a gripping narrative of innovation and intrusion. When a seemingly routine event from a service provider spirals into a mass contagion, the fabric of our digital lives is torn apart. Personal privacy is no longer a shield but a traded commodity, vulnerable to the whims of hackers infiltrating top companies.
Through its pages, the book...
2) Digital Dangers: Navigating the Perils of Online Safety and Piracy. Protecting Yourself and Your Con
Author
Description
"Digital Dangers: Navigating the Perils of Online Safety and Piracy" is a comprehensive guide that sheds light on the pervasive threats lurking in the vast landscape of the internet. From cyberbullying and online predators to phishing scams and identity theft, this book delves into the various forms of digital dangers that individuals face in today's increasingly connected world. Through real-life examples and expert insights, readers are equipped...
Author
Description
Question : est-ce que ça vous intéresse d'apprendre le hacking des applications web, recevoir une formation vidéo et faire partie d'un groupe de hackers en investissant le minimum de temps et d'argent ?Alors lisez ce qui suit :Quand j'ai commencé avec tout ces trucs de hacking (il y a des années de cela.), entendre le mot «injection SQL» suffisait pour me dégoûter de tout ce qui en rapport avec le Web, ça me paraissait trop compliqué de...
Author
Description
Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical...
Author
Description
Delve into the dynamic and ever-evolving realm of cybersecurity with this comprehensive study guide, meticulously crafted to guide aspiring professionals on their path to (ISC)² CC certification. Navigating through fundamental concepts and advanced techniques, this book serves as a trusted companion for those seeking to master the intricate landscape of cybersecurity. From understanding the significance of safeguarding digital assets to delving into...
Author
Description
Since its original publication in 1998, Introduction to Executive Protection has been considered the bible of the executive security industry. Now in its 4th edition, this new volume, conceived and developed by Dale L. June, drawing from his experiences in the United States Secret Service, law enforcement & the private sector, has been reworked and revised with new content, chapters, and input with over 60% new material. Much more than simply...
Author
Description
In the dynamic landscape of the digital age, small businesses are not immune to the ever-growing threats of cyberattacks. As technology continues to advance, so do the sophisticated methods employed by cybercriminals seeking to exploit vulnerabilities and compromise sensitive information. In this e-book, "Cybersecurity Essentials for Small Businesses: Safeguarding Your Digital Assets," we embark on a journey to empower entrepreneurs and small business...
Author
Description
Embark on a transformative journey through the digital landscape with "Social Sector - Check What Awaits You," a compelling guide that unveils the hidden threats lurking in the vast realms of the internet. Authored with expertise and insight, this book is an essential companion for anyone navigating the online world. Explore the intricacies of cybersecurity, social engineering, and digital privacy, gaining a deeper understanding of the challenges...
Author
Description
You can't always predict who will use your products, or what emotional state they'll be in when they do. But by identifying stress cases and designing with compassion, you'll create experiences that support more of your users, more of the time.
Join Sara Wachter-Boettcher and Eric Meyer as they turn examples from more than a dozen sites and services into a set of principles you can apply right now. Whether you're a designer, developer, content...
Author
Description
"Life and Challenges of IT Professionals" provides an insightful journey into the dynamic realm of Information Technology, unraveling the intricacies of the profession and the individuals who drive its evolution. We embark on a comprehensive exploration of the digital age, tracing the rise of IT professionals from its inception to the present day. The book encompasses a broad spectrum of topics, from the ever-evolving tech landscape and the challenges...
Author
Description
What's this world coming to?! so many people are asking. Opportunities to buy and sell, to manipulate and be manipulated, to choose and to have one's choices made for them are seemingly everywhere these days...while opportunities to connect one-on-one in genuinely enjoyable, in-person ways with other likeminded souls keeps dwindling. Technology is changing. The economy is changing. The way we learn and shop and work and communicate and allow our children...
Author
Description
The world has been engulfed by an unprecedented public health crisis, forcing us to navigate through uncharted waters. The COVID-19 pandemic has disrupted our daily lives, upended our economies, and exposed the vulnerability of our healthcare systems. As we grapple with the pandemic and its aftermath, we are confronted with complex dynamics of fear, power, and limited freedom of choice. This book is a reflection of the author's deep concern about...
13) TROLL
Author
Description
Scotty is no stranger to being bullied, but after a chance encounter in an online chatroom, he finds hope in Rebecca.
Scotty is about to find out that people on the internet can be worse than people in real life.
Facebook. Twitter. These are the places the modern trolls thrive.
How far would you be willing to go to bring a troll to justice?
A horrific look at the reality of the damage internet trolls can cause, with a touch of bizarro...
Author
Description
What would you do if your ambitious career suddenly transformed into a deadly game of international espionage? A true-life thriller equal to that of a heart-stopping John Grisham novel, Ashley Yablon's story takes readers into the dark crevices of deceit and corporate greed of one of the world's most powerful Chinese telecom giants. As the freshly minted General Counsel for telecom company ZTE, Yablon uncovers an illegal scheme selling billions of...
15) Advanced Physical Security and Asset Protection Techniques: Best Practices and Real-World Applica
Author
Description
"Advanced Physical Security and Asset Protection Techniques: Best Practices and Real-World Applications" is a comprehensive guidebook that provides a detailed overview of the latest trends, technologies, and best practices in physical security and asset protection. The book covers a wide range of topics including access control systems, surveillance systems, intrusion detection systems, physical barriers and perimeter security, identifying valuable...
Author
Series
Description
Hop on a transformative journey into the heart of e-commerce excellence with "E-Commerce Elevation: Building a Business That Soars." This isn't just a guide; it's your compass in the dynamic world of online commerce, meticulously crafted to elevate your business to unprecedented heights. Dive into the evolution of e-commerce, unraveling its intricacies and decoding the success stories of industry titans. From laying the groundwork with a robust business...
Author
Description
Want a discounted price on THREE different eBooks? Here's what you'll get with this three book package: Darknet: The ULTIMATE Guide on HOW TO BE ANONYMOUS Online Was Snowden right? Want to surf the web anonymously? Cloak your activities? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP. This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving...
Author
Description
This book is an introduction to the worker-owned cooperative movement in the USA. It was first released in 2011, and now it includes 79 videos, all active when connected to the internet, most of them realized by the cooperators. They make the content less boring, more entertaining, and lively.There is a section on Electric cooperatives and their new role in bridging the rural divide to bring the internet to rural America, a significant issue for a...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request