Catalog Search Results
Author
Language
English
Description
What every current and aspiring cyber security leader and professional needs to know to become truly exceptional. Bridging the gap between business and cyber security. Actionable rules to maximise value from cyber security and address cyber threats. Differentiating skills for professional excellence and massive career success. In a hyperconnected world powered by technology, the importance of cyber security to our collective prosperity and progress...
Pub. Date
[2017]
Language
English
Description
Picking up immediately after the thrilling cliff-hanger, Negan forces Rick and the group to fall under his will, brutally convincing them to live by his rules. To prevent further bloodshed, Rick genuinely believes they can make life under Negan, however terrible, work. But he soon learns that Negan can't be reasoned with, and they must prepare to go to war now. Victory will require more than Alexandria, and Rick will need to convince their new...
Author
Pub. Date
2012
Language
English
Description
"Getting a virus on your computer is a pain and they're becoming ever more difficult to remove. In this webcast, Mike Halsey, the author of Troubleshooting Windows 7 Inside Out, talks you through the process of manually and safely removing viruses and malware from your computer without damaging your files or Windows itself."--Resource description page.
85) Full disclosure
Author
Pub. Date
[2019]
Language
English
Appears on these lists
Description
Simone, seventeen, HIV-positive and in love for the first time, decides that facing potential bullies head-on may be better than protecting her secret.
Series
Pub. Date
[2017]
Language
English
Description
Following the epic second-season cliffhanger, the highly anticipated third season finds the crew of the USS Nathan James shifting their attention to Asia after President Michener hears rumblings that the Chinese leader, President Peng, has been hoarding the "Scott cure" instead of distributing it to the people in the region.
Author
Language
English
Formats
Description
From the award-winning, New York Times bestselling author of NOS4A2 and Heart-Shaped Box comes a chilling novel about a worldwide pandemic of spontaneous combustion that threatens to reduce civilization to ashes and a band of improbable heroes who battle to save it, led by one powerful and enigmatic man known as the Fireman. The Fireman is coming. Stay cool. No one knows exactly when it began or where it originated. A terrifying new plague is spreading...
Author
Pub. Date
2021.
Language
English
Description
Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques. Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques...
90) Toxic game
Author
Series
Pub. Date
2019.
Language
English
Formats
Description
"On a rescue mission in the heart of the Indonesian jungle, Dr. Draden Freeman and his GhostWalker team need to extract the wounded as quickly as possible--or risk spreading a deadly virus unleashed by a terrorist cell. When Draden gets infected he forces his team to leave him behind. He won't risk exposing anyone else. He intends to find the ones responsible and go out in a blaze of glory. Shylah Cosmos's mission is to track the virus and remain...
Pub. Date
[2018]
Language
English
Description
Based on William Brinkley's popular novel, it chronicles a global catastrophe that nearly decimates the world's population. Because of its positioning, the Navy destroyer U.S.S. Nathan James avoided falling victim to the devastating tragedy. But now the crew and its captain must confront the reality of their new existence in a world where they may be among the few remaining survivors.
Author
Language
English
Description
Cybercriminals can ruin your life-this book teaches you to stop them before they can.
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It's important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you.
You don't have to give up on the convenience of having an online life. You can fight back and protect...
94) Viral
Author
Pub. Date
2021.
Language
English
Description
"Brian Murphy and his family are in Cape Cod when his wife, Emma, comes down with flu-like symptoms. But their leisurely return home to New York City becomes a race to the hospital as she begins seizing in the care. She is diagnosed with eastern equine encephalitis, a rare and lethal mosquito-borne disease. Complicating the situation further, Brian and Emma's daughter begins to exhibit alarming symptoms, too. Furious at the shockingly indifferent...
95) 12 monkeys
Pub. Date
©2009
Language
English
Description
"Cole is sent back in time to save the human race from a deadly virus that has forced mankind into dank underground communities in the future. Along his travels, he encounters a psychiatrist and a mental patient, brilliantly portrayed by Brad Pitt, who may hold the key to the mysterious rogue group, the Army of the 12 Monkeys, thought to be responsible for unleashing the killer disease. Believing he can obtain a pure virus sample in order to find...
98) Anarchy: a novel
Author
Series
Advent trilogy volume 2
Pub. Date
2013.
Language
English
Description
When an accused murderer disappears from a locked cell on her watch, Corporal "Goose" Maculloch of the Royal Canadian Mounted Police tracks the vanished girl through the wilderness of Vancouver Island.
Author
Series
Language
English
Description
Ever wondered how hackers breach big corporations? Wonder no more. We detail a step-by-step real life scenario to hack a luxury brand, steal credit card data and spy on board members.
Art of exploitation. We start by building a small hardware backdoor that we plant in a retail store owned by our target brand. You get to learn about the Wiegand protocol and how to bypass card readers found in all major shops and companies.
Network security. Using...
Author
Series
Language
English
Description
In our interconnected world, where information flows seamlessly across networks and systems, safeguarding digital assets has become an imperative. "Fortifying Digital Fortress: A Comprehensive Guide to Information Systems Security" is a comprehensive exploration of strategies, methodologies, and best practices that organizations and individuals can adopt to protect their information systems from ever-evolving cyber threats. This book provides a holistic...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request