Catalog Search Results
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
This program will show you recommended ways of handling difficult situations that your library and staff may encounter. Among the issues covered are potentially violent patrons, bomb threats, sexual harassment, and inappropriate Internet browsing. "Highly recommended ..." - Video Librarian.
Author
Publisher
W.W. Norton & Company
Pub. Date
[2018]
Language
English
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Series
Hugo Marston novels volume 1
Language
English
Description
When his bookseller friend, a former Holocaust survivor and Nazi hunter, is kidnapped and other booksellers are murdered, Hugo Marston, head of security for the U.S. embassy in Paris, discovers a shocking conspiracy.
Author
Language
English
Formats
Description
"The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location,...
Author
Series
Publisher
Walter Foster Jr., an imprint of Quarto Publishing Group USA Inc
Pub. Date
2016.
Language
English
Description
"Children can master a new digital talent--creating blogs, vlogs, and podcasts--in 10 easy lessons! Each stage is fully illustrated with step-by-step illustrations and photographs, so children can learn 10 key skills to develop and promote an exciting new online blog or vlog. Along with professional tips and practical techniques, this book will help young readers become expert bloggers in no time. From planning what to share with the world to learning...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request