security measures

Type: 
Topical Term
Subfield: 
x
Alias: 
security measures

Prepper's home defense

security strategies to protect your family by any means necessary
2012
"Provides instructions and guidelines for creating security strategies to protect against a potential failure of civilization, and includes tips on perimeter security, house fortifications, firearms and weaponry, and security animals"--OCLC.
Cover image of Prepper's home defense

Spotting online scams and fraud

2024
Scammers adopt fake identities and use them to defraud people using texts, emails, social media sites, ecommerce sites, dating apps, and banking apps. Scammers can operate from almost anywhere in the world and in most cases victims have little chance of getting their money back.

Hacking

The Art of Exploitation
2008
Presents a guide to computer hacking, including step-by-step information on exploiting sloppy programming, using buffer overflows and format strings, writing code, redirecting network traffic, and cracking encryptions, and contains core techniques and clever tricks to create new hacks and defend against potential attacks. Accompanying LiveCD provides a complete Linux programming and debugging environment.

Fancy Bear goes phishing

the dark history of the information age, in five extraordinary hacks
2023
It?s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian ?Dark Avenger,? who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton?s cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers? tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G?del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.
Cover image of Fancy Bear goes phishing

Protect your data and identity online

2022
"School, work, banking, and shopping have all moved online in our modern world. This can be convenient for users, but it also means that sensitive data is at risk. Criminals seek to steal that data to carry out crimes. 'Protect Your Data and Identity Online' examines these risks and explains how users can take steps to defend themselves"--Provided by publisher.

Online predators

2022
"The power of the internet makes it easy to connect with friends, but it also makes it simple for dangerous strangers to connect with and harm users. 'Online Predators' examines how users can protect themselves from this danger online, including the warning signs to look for"--Provided by publisher.

Online scams

2022
"Examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly"--Provided by publisher.

The art of invisibility

the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
2019
"[Kevin Mitnick maintains that] your every step online is being tracked and stored, and your identity literally stolen ... [He] uses true-life stories to show exactly what is happening without your knowledge, teaching you 'the art of invisibility' -- online and real-world tactics to protect you and your family, using easy step-by-step instructions ... [Covers] everything from password protection and smart Wi-FI usage to advanced techniques designed to maximize your anonymity"--Provided by publisher.

Digital cryptology

2022
As our time spent online increases, our need for strong encryption to keep our data safe also increases. Learn about mathematics that are the basis of encryption, plus cyberattacks, digital currency, and cryptocurrency.
Cover image of Digital cryptology

Area 51

Explores the mysteries that surround Area 51, discussing the history of the once secret military base, strange sightings in the area, links to the government, and conspiracy theories associated with the base.
Cover image of Area 51

Pages

Subscribe to RSS - security measures