Kevin Mitnick, the world's most famous hacker, provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He also discusses more advanced "elite" techniques,...
Computer security
- Author:Mitnick, Kevin D., Vamosi, RobertSummary:
- Author:Golbeck, JenniferSummary:
We have never before in human history been able to share so much about ourselves so quickly. Neither have we ever been so exposed to forces that want to take advantage of that capability. Taking Control of Your Personal Data will open...
- Author:Black, CaraSummary:
Set in 1994 Paris, Aimée Leduc fears that a 1960s Communist gang is on the loose--and her long-lost mother just may be one of them.
- Author:Archer, Norm, Sproule, Susan, Yuan, Yufei, Guo, Ken, Xiang, JunlianSummary:
Personal data is increasingly being exchanged and stored by electronic means, making businesses, organizations and individuals more vulnerable than ever to identity theft and fraud. This book provides a practical and accessible guide to...
- Author:Woods, StuartSummary:
Stone Barrington faces down a rival with cutting-edge tactics in this heart-racing thriller from the #1 New York Times Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This...
- Author:Crawley, Kim.Summary:
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines...
- Author:Redpath, IanSummary:
Discover the process of e-discovery and put good practices in place. Electronic information involved in a lawsuit requires a completely different process for management and archiving than paper information. With the recent change to...
- Author:BROWN, DanSummary:
When the NSA's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant and beautiful mathematician. What she uncovers sends shock waves...
- Author:Singer, P. W.Summary:
In Cybersecurity and Cyberwar: What Everyone Needs to Know, New York Times bestselling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a...
- Author:Anzaldua, ReynaldoSummary:
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out...
- Author:Smith, Jeremy N.Summary:
This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien. When she arrived at MIT in the 1990s, Alien...
- Author:Doctorow, CorySummary:
Cory Doctorow's Attack Surface is a standalone novel set in the world of New York Times bestsellers Little Brother and Homeland. Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism...
- Author:Preisler, JeromeSummary:
In the wake of stunning terrorist attacks around the world, Net Force jumps into action. The president's new cybersecurity agency homes in on a dangerous figure operating in the shadows of the Carpathian mountains. And he's...