Catalog Search Results
1) Mood science
Author
Series
Publisher
Simon & Schuster Books for Young Readers
Pub. Date
[2021]
Physical Desc
139 pages : illustrations ; 22 cm.
Description
"Franny K. Stein has had quite enough of her feelings getting in the way. So she physically removes them with the help of one of her machines. But it turns out that not having feelings can make things even worse, especially when you've accidentally released a virus that's turning everybody into toads. Good thing she has the help of her grandma, Granny Fran, and her Sense of Duty to help her shake the apathy"--
Author
Description
How Not to Get Phished equips you with the knowledge and tools to:Unmask the tactics phishers use to steal your information and money.Become a cybersecurity sleuth,sharpening your eye to spot red flags and avoid falling victim.Build a fortress around your accounts with essential security practices.Navigate the digital world confidently with proactive online habits.Respond effectively if you suspect you've been phished, minimizing damage and recovering...
Author
Description
Get the Summary of Bruce Sterling's The Hacker Crackdown Law and Disorder on the Electronic Frontier in 20 minutes. Please note: This is a summary & not the original book. "The Hacker Crackdown" delves into the complex world of hackers, law enforcement, and the telecommunications industry, set against the backdrop of a major AT&T network failure in 1990. The book explores the historical development of telephone technology, from Alexander Graham Bell's...
5) Toxic prey
Author
Series
Prey series volume 34
Virgil Flowers novels volume 16
Prey novel volume 34
Lucas Davenport and Virgil Flowers novel volume 4
Virgil Flowers novels volume 16
Prey novel volume 34
Lucas Davenport and Virgil Flowers novel volume 4
Appears on these lists
Description
Gaia is dying. That, at least, is what Dr. Lionel Scott believes. A renowned expert in tropical and infectious diseases, Scott has witnessed the devastating impact of illness and turmoil at critical scale. Society as it exists is untenable, and the direct link to Earth's death spiral; population levels are out of control and people have allowed disarray and disorder to run rampant. While most are concerned about deadly disease, Scott knows that it...
Author
Description
Welcome to our captivating guide on the world of malware. In this exploration, we uncover the dark secrets of viruses, Trojans, ransomware, spyware, rootkits, and spam. With gripping real-life examples, we delve into their sinister traits, destructive impacts, and powerful prevention strategies. By immersing ourselves in this knowledge, we empower ourselves to safeguard against these digital predators and forge a secure digital landscape. Get ready...
Author
Description
"Defending the Digital Perimeter: Network Security Audit Readiness Strategies" is a must-read eBook for IT professionals, cybersecurity experts, and business leaders who are dedicated to safeguarding their organization's digital assets. In today's interconnected world, where data breaches and cyberattacks are on the rise, maintaining a robust and secure network perimeter is of paramount importance.This comprehensive eBook delves into the intricacies...
Author
Description
Cybercriminals can ruin your life-this book teaches you to stop them before they can.
Cybercrime is on the rise. Our information is more valuable and vulnerable than ever. It's important to learn to protect ourselves from those who wish to exploit the technology we rely on daily. Cybercriminals want to steal your money and identity and spy on you.
You don't have to give up on the convenience of having an online life. You can fight back and protect...
Author
Description
Millions of normal people fall prey to cyberattacks, scams, malware, and ransomware every year, and it's only getting worse.
The importance of cybersecurity cannot be overstated. Cybercriminals are constantly finding new ways to exploit vulnerabilities in computer systems and networks. They use a variety of tactics, including phishing scams, malware, and ransomware, to gain access to sensitive data and steal personal information.
Cyber attacks...
Author
Series
Description
In our interconnected world, where information flows seamlessly across networks and systems, safeguarding digital assets has become an imperative. "Fortifying Digital Fortress: A Comprehensive Guide to Information Systems Security" is a comprehensive exploration of strategies, methodologies, and best practices that organizations and individuals can adopt to protect their information systems from ever-evolving cyber threats. This book provides a holistic...
Author
Description
In "Hack the Airwaves," Josh, a seasoned cybersecurity expert, delves deep into the intricate world of Bluetooth Low Energy (BLE) security. As BLE devices become increasingly integrated into our daily lives, the potential for vulnerabilities and threats grows exponentially. This comprehensive guide is designed for hackers, red team operators, pentesters, and other cybersecurity practitioners who seek both a foundational understanding and advanced...
Author
Description
Introducing CYBERWATCH 101: The Ultimate Cybersecurity Book Bundle!
Are you concerned about the growing threats in the digital world? Do you want to safeguard your digital assets and protect your online presence? Look no further! CYBERWATCH 101 is your comprehensive guide to mastering the art of cyber defense and infrastructure security.
���� BOOK 1 - CYBERWATCH: A BEGINNER'S GUIDE TO DIGITAL SECURITY: Get started on your cybersecurity journey...
Author
Description
Introducing the "Zero Trust Security" Book Bundle: Building Cyber Resilience & Robust Security Postures!
In an age of digital transformation, securing your digital world has never been more crucial. The "Zero Trust Security" book bundle is your comprehensive guide to revolutionize your cybersecurity strategies, from beginners to seasoned experts.
Book 1-Zero Trust Security: A Beginner's Guide to Building Cyber Resilience: Discover the foundational...
Author
Description
In "Careers in Information Technology: Cybersecurity Analyst," readers are introduced to the vital and ever-changing topic of cybersecurity in a perceptive manner. This thorough guide delves into the fascinating field of cybersecurity, illuminating the many prospects, difficulties, and routes to success in this highly sought-after profession. Because businesses, governments, and individuals rely on the security of their digital assets and data, cybersecurity...
16) Burp Suite
Author
Description
Introducing the "Burp Suite: Novice to Ninja" Book Bundle - Your Path to Becoming a Cybersecurity Expert!
Are you ready to unlock the secrets of ethical hacking and penetration testing? Do you want to master the art of securing web applications, networks, mobile devices, and cloud environments? Look no further, because our comprehensive book bundle has you covered!
What's Inside:
���� Book 1 - Burp Suite Fundamentals: A Novice's Guide to...
Author
Description
���� Introducing "Cyber Auditing Unleashed" - Your Ultimate Guide to Advanced Security Strategies for Ethical Hackers! ����
Are you ready to master the art of ethical hacking and become a formidable defender of the digital realm? Look no further! Dive into the world of cybersecurity with our comprehensive book bundle, "Cyber Auditing Unleashed." This four-book collection is your ticket to advanced security auditing, providing you...
Author
Description
Buckle up and prepare to dive into the thrilling world of Zero-Click Exploits. This isn't your average cybersecurity guide - it's a wild ride through the dark underbelly of the digital world, where zero-click exploits reign supreme.Join Josh, a seasoned cybersecurity professional and the mastermind behind Greyhat Intelligence & Investigative Solutions, as he spills the beans on these sneaky attacks that can compromise systems without a single click....
Author
Description
Unlock the Secrets of Malware with "Malware Reverse Engineering: Cracking the Code" - Your Comprehensive Guide to Cybersecurity
Are you ready to embark on a transformative journey into the world of cybersecurity and malware reverse engineering? Look no further than our book bundle, "Malware Reverse Engineering: Cracking the Code." This carefully curated collection spans four volumes, each designed to cater to your expertise level, from beginners...
Author
Description
Unlock the Power of Blue Team Defense!
���� Introducing "Blue Team Operations: Defense" - Your Comprehensive Cybersecurity Solution
Are you ready to take on the challenges of the ever-evolving digital threat landscape? Equip yourself with the knowledge and skills needed to excel in the realm of cybersecurity defense with our exclusive book bundle, "Blue Team Operations: Defense." This comprehensive collection of four essential volumes covers...
Didn't find it?
Can't find what you are looking for? Let us know! Suggest a Title