Catalog Search Results
Author
Language
English
Description
A terrifying new plague is spreading like wildfire across the country, striking cities one by one: Boston, Detroit, Seattle. The doctors call it Draco Incendia Trychophyton. To everyone else it is Dragonscale, a highly contagious, deadly spore that marks its hosts with beautiful black and gold marks across their bodies before causing them to burst into flames. Millions are infected; blazes erupt everywhere. There is no antidote. No one is safe. Harper...
2) Sylo
Author
Series
Language
English
Formats
Description
"They came from the sky parachuting out of military helicopters to invade Tucker Pierce's idyllic hometown on Pemberwick Island, Maine. They call themselves SYLO and they are a secret branch of the U.S. Navy. SYLO's commander, Captain Granger, informs Pemberwick residents that the island has been hit by a lethal virus and must be quarantined. Now Pemberwick is cut off from the outside world. Tucker believes there's more to SYLO's story. He was on...
Author
Language
English
Description
When a new virus surfaces, Lucy and her husband Reed, along with their five closest friends and family, sequester themselves on Reed's family's private island off the coast of Maine where she feels her own grip on reality slipping as tempers flare, strange signs appear and accidents turn deadly.
Author
Language
English
Formats
Description
"Nico Storm and his father Willem drive a truck filled with essential supplies through a desolate land. They are among the few in South Africa -- and the world, as far as they know -- to have survived a devastating virus which has swept through the country. Their world turned upside down, Nico realizes that his superb marksmanship and cool head mean he is destined to be his father's protector, even though he is still only a boy. But Willem Storm,...
Author
Language
Español
Description
Los cambios tecnológicos del último siglo han generado un nuevo y disruptivo dominio —el ciberespacio—, el cual no solo está modificando la vida a nivel individual de las personas, sino también a nivel macro. Por ello, hoy los organismos responsables de la defensa en distintas partes del mundo, han debido rearticular sus procedimientos y prioridades, al tener que asumir, además de la protección de los dominios tradicionales de tierra, mar...
Author
Language
English
Description
There is a town that has two types of people, those that only have green hair and those that only have red hair. Why the Greenheads only have green hair and why the Redheads only have red hair is no mystery. It's no mystery why their hair keeps changing, but it's definitely a problem! Conflict erupts in the town as the two groups push each other to the limits. It is the bravery and wisdom of two children that lead the town to an amazing and healing...
Author
Language
English
Description
How Not to Get Phished equips you with the knowledge and tools to:Unmask the tactics phishers use to steal your information and money.Become a cybersecurity sleuth,sharpening your eye to spot red flags and avoid falling victim.Build a fortress around your accounts with essential security practices.Navigate the digital world confidently with proactive online habits.Respond effectively if you suspect you've been phished, minimizing damage and recovering...
Author
Language
English
Description
"From Pulitzer Prize winner and New York Times bestselling author Matt Richtel, a high-concept about a deadly virus that threatens the existence of mankind"--
An airplane touches down at a desolate airport in a remote Colorado ski town. Shortly after landing, Dr. Lyle Martin, a world-class infectious disease specialist, is brusquely awakened to shocking news: Everyone not on the plane appears to be dead. The world has gone dark. While they were in...
Author
Language
English
Description
HACKING
With growing digital dependence and an increase in cyber threats, you cannot afford to be in the dark as far as your digital and online security is concerned. This book is a simple guide that will reveal the many potential risks and mistakes that can expose you to hackers.
This is a book for anyone and everyone. If you use a mobile phone, computer, or any other digital device, then this book will serve as your complete guide...
Author
Language
Español
Description
Originalmente, el término "hacker" se refería a un programador experto en sistemas operativos de computadoras y código de máquina. Hoy, se refiere a cualquiera que realice actividades de piratería o piratería. La piratería es el acto de cambiar las características de un sistema para lograr un objetivo que no está dentro del propósito original del creador. La palabra "piratería" generalmente se percibe negativamente, especialmente por personas...
Author
Series
Language
English
Description
This is the story of one hacker who met his match in the form of machine learning, behavioral analysis, artificial intelligence, and a dedicated SOC team while breaking into an offshore service provider.
Most hacking tools simply crash and burn in such a hostile environment.
What is a hacker to do when facing such a fully equipped opponent? In this new edition, we cover step-by-step tricks and techniques to circumvent next-generation security vendors...
Author
Language
English
Description
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State...
Author
Language
English
Description
Test your wireless network's security and master advanced wireless penetration techniques using Kali Linux
About This Book
Develop your skills using attacks such as wireless cracking, Man-in-the-Middle, and Denial of Service (DOS), as well as extracting sensitive information from wireless networks
Perform advanced wireless assessment and penetration tests
Use Embedded Platforms, Raspberry PI, and Android in wireless penetration testing with Kali...
Author
Language
English
Description
HACKING
Computer hacking is an often misunderstood activity, with hackers being portrayed in the media as all being criminals and deviants. However, as you will discover through reading this book, there is more to hacking than meets the eye!
This informative book dispels the myths surrounding computer hacking, and teaches you about the different types of hackers in the world. You will learn about the different hacking techniques that can be used,...
Author
Language
English
Description
COMPUTER HACKING
Most people are quite familiar with the word hacker due to the attention these entities get in the media. In this book, you will learn about how the world of hacking is growing and what you can do to protect your business from being the victim of a hacking. The last thing any business owner wants to do is leave themselves open to attacks due to lack of knowledge and planning on their part. This book will show you how you can take...
Author
Language
English
Description
Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed, they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles, you want the best measures you can afford. But, you need to operate with the assumption that Prevention and Detection will eventually...
Author
Language
English
Description
This is not your regular hacking book. Hell, some might say it is not even a book. This is a training program that gives you a free coupon to access dedicated and real machines with real flaws for 24 hours straight.Reading about hacking is fun, hacking real systems is a whole other level of awesomeness! This program is an opportunity to hone your skills on the training platform at www.hacklikeapornstar.com/training: no simulation, no regex based wargames,...
Author
Language
English
Description
Terrified about identity theft and data breaches? Discover a foolproof method to protect your information and get online with peace of mind.
Are you worried about your family members getting scammed or hacked? Want to keep your computers and phones, protected with ironclad security? Cyber security expert George Mansour has helped individuals and businesses protect their data for over 15 years. Now he'll share his simple system for safeguarding your...
Author
Series
Language
English
Description
This is not a book about information security. Certainly not about IT. This is a book about hacking: specifically, how to infiltrate a company's network, locate their most critical data, and make off with it without triggering whatever shiny new security tool the company wasted their budget on.Whether you are a wannabe ethical hacker or an experienced pentester frustrated by outdated books and false media reports, this book is definitely for you.We...
Author
Language
English
Description
COMPUTER HACKING
Computer hacking is an extremely powerful skill to have. This book focuses on ethical hacking - also known as white hat hacking.
Inside, you will learn the basics of hacking for beginners.
This includes the different types of hacking, the reasons behind hacking, jobs in the hacking world, how to do some basic hacks, and the skills a hacker requires.
Many hackers are hired by companies to ensure that their computer systems are...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request