Catalog Search Results
Author
Description
The cybersecurity industry has seen an investment of over $45 billion in the past 15 years. Hundreds of thousands of jobs in the field remain unfilled amid breach after breach, and the problem has come to a head. It is time for everyonenot just techiesto become informed and empowered on the subject of cybersecurity. In engaging and exciting fashion, Big Breaches covers some of the largest security breaches and the technical topics behind them such...
Author
Description
"This book answers the question: How do businesses effectively respond to the evolving definition of privacy through their strategies, operations, cybersecurity posture, and adaptation to new regulations? The book walks the reader through privacy, it's definitions and implications; data regulation, and its increasing impact on business; and cybersecurity as a newly critical business practice. In addition, the book addresses the overarching significance...
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Description
Who is watching you… and why? Written for middle-grade and older readers, Eyes and Spies looks at the way information and data about us is collected and used by individuals, governments, companies, and organizations. Each chapter covers one aspect of the subject, from data collection to computer surveillance to personal privacy. Arguments for both increased security and increased privacy are offered, which encourages readers to think critically...
Author
Formats
Description
Never before in human history have people been able to share so much about themselves so quickly. Neither have they ever been so exposed to forces that want to take advantage of that capability. This course will open eyes to the surprising extent of that exposure and will discuss options for keeping personal data as safe as possible, help to determine personal privacy profile, and understand the current U.S. laws and proposed state laws regarding...
Author
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Description
As libraries depend more and more on technology to provide essential services, they need to create a comprehensive response and recovery plan in the event of floods, fire, or other natural-- or man made-- disasters. This guide includes lessons learned from successful efforts in providing digital continuity and recovering from a variety of situations.
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request