Catalog Search Results
Author
Description
Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you’ll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network. Inside, nine minibooks cover essential, up-to-date information for networking in systems such as Windows 10 and...
Author
Description
"Building an online business is something every creative person can pursue, and Brainard Carey is here to show you how to sell your work independently and efficiently. You'll learn how to develop a presence, promote your business, and reach customers. Carey draws from his own extensive experience and real examples of artists and entrepreneurs who succeeded in selling their work online"--Page [4] of cover.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Formats
Description
"Make your online business dream a reality! The updated edition covers all the basics--creating your site, offering products in an online store, and keeping accurate books. It also addresses more complex issues, including navigating primary legal, accounting, and security challenges. Use this resource to find your market niche, build your business and marketing plan, and decide on the right revenue model. It's time to make your big dream happen with...
12) LinkedIn
Author
Description
In this sixth edition, which is an all-access introduction to the LinkedIn scene, an entrepreneurship guru shows you how to create an attractive profile that will make employers give you a second glance as well as techniques for making useful connectionsacross the globe.
15) Neuromancer
Author
Formats
Description
Case, a nerve-damaged data thief, is recruited by a new employer for a last-chance run against a powerful artificial intelligence.
Case, a burned out computer whiz, is asked to steal a security code that is locked in the most heavily guarded databank in the solar system
Description
T9 is a LTE Mobile Hotspot that simultaneously supports 15 device connections through built-in Wi-Fi AP. With advanced LTE technology and multi band support, T9 provides seamless wireless data connection whenever needed, wherever it goes. The OLED display with unique icons and text panel can provide easy-to-recognize device service status to customers. The stylish pocket-sized and semi-rugged design makes it easy for customers to carry it around anywhere...
18) Corsair
Author
Description
"In the early 2020s, two young, genius computer hackers, Elizabeth Santiago and David Schwartz, meet at MIT, where Schwartz is sneaking into classes, and have a brief affair. David is amoral and out for himself, and soon disappears. Elizabeth dreams of technology and space travel and takes a military job after graduating. Nearly ten years later, David is setting himself to become a billionaire by working in the shadows ... and Elizabeth works in intelligence...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request