Catalog Search Results
Author
Pub. Date
[2023]
Language
English
Description
The first expert discussion of the foundations of cybersecurity In Cybersecurity First Principles, Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles. The author convincingly lays out the arguments for the absolute cybersecurity first...
Pub. Date
[2014]
Language
English
Description
The Dark Web is a secret online space that allows users complete anonymity. As online surveillance increases, this virtual world has grown in popularity. For some it is a place where criminals can operate - a shadowy underworld where users can purchase anything from illegal drugs to credit card details. For others, it is a haven, free from the government control and censorship that threatens the regular web. As users, programmers, governments and...
Language
English
Description
For years, companies have used temporary employees to keep costs low, but with jobless numbers rising amidst a recession, starting an employment agency is risky business. In this program, Meighen Nehme, founder of The Job Shoppe, a Windsor, Ontario-based temp agency, faces a challenging economy and crosstown competition. Her business plan and decisions are critiqued by Arlene Dickinson, CEO of a national marketing communications firm, and Sylvie Hyndman,...
Author
Pub. Date
2018.
Language
English
Description
"Views differ on bitcoin, but few doubt the transformative potential of Blockchain technology. The Truth Machine is the best book so far on what has happened and what may come along. It demands the attention of anyone concerned with our economic future." -Lawrence H. Summers, Charles W. Eliot University Professor and President Emeritus at Harvard, Former Treasury Secretary From Michael J. Casey and Paul Vigna, the authors of The Age of Cryptocurrency,...
Author
Pub. Date
2018.
Language
English
Description
Educate yourself so that your kids can enjoy the best of the internet and social media without the risks, such as cybercrime, sexting, cyberbullying, phishing, cyberstalking, grooming, nude selfies, and other internet dangers. This practical, go-to guide explains the digital dangers kids might encounter when they use social media, join chats, share selfies, use apps, and explore the internet. How do you educate children and teens about their digital...
Pub. Date
[2014], c2014
Language
English
Description
Every hour of every day, our digital interactions are being recorded and logged. We live in the age of big data, where the seemingly mundane information of our everyday existence has enormous value. With the help of expert data trackers, this revealing doc offers a comprehensive look at how governments and large companies keep tabs on us. It follows the information trail of an ordinary Australian family on a typical day.
Pub. Date
uuuu
Language
English
Description
Gale Presents: Udemy is an online learning platform that provides instruction for adults who want to upskill for a new job, advance in their current profession, or deepen a personal interest. This top collection, curated from courses from Udemy.com and powered by Udemy for Business, gives users access to relevant skills training, helping them achieve success at work and in life. Before enrolling, users can review key information about a course, its...
Pub. Date
[2014], c2010
Language
English
Description
Thieves are breaking into stores, gas stations, and restaurants and actually ripping out the hard drives attached to the point of sale terminals used to swipe your credit or debit cards. While retailers are keeping quiet, and credit card companies cover your losses, in the end, we all pay a price-and for the crooks, it's a windfall.
15) Spam
Pub. Date
[2006], c2004
Language
English
Description
What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater cooperation between legitimate businesses, Internet and online...
Pub. Date
[2005], c2001
Language
English
Description
How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who know how to access it-even without your permission. Finally,...
17) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Pub. Date
2019.
Language
English
Description
An urgent new warning from two bestselling security experts--and a gripping inside look at how governments, firms, and ordinary citizens can confront and contain the tyrants, hackers, and criminals bent on turning the digital realm into a war zone.
Author
Pub. Date
2018.
Language
English
Description
The Internet has become a staple to everyday life, so it's easier than ever for people to share details about where they're going and what they're doing. This engaging book explains the dangers of sharing your plans online and teaches readers to be more careful about what they put on the Internet. Accessible text and full-color photographs aid in the understanding of key issues and help promote online privacy and safety. This important resource for...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request