Catalog Search Results
Author
Language
English
Formats
Description
"With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques...
Author
Language
English
Formats
Description
Endless terror. Refugee waves. An unfixable global economy. Surprising election results. New billion-dollar fortunes. Miracle medical advances. What if they were all connected? What if you could understand why? The Seventh Sense examines the historic force now shaking our world -- and explains how our leaders, our businesses, and each of us can master it. All around us now we are surrounded by events that are difficult to understand. But every day,...
Author
Language
English
Formats
Description
The revolution will be Twittered! declared journalist Andrew Sullivan after protests erupted in Iran in June 2009. Yet for all the talk about the democratizing power of the Internet, regimes in Iran and China are as stable and repressive as ever. In fact, authoritarian governments are effectively using the Internet to suppress free speech, hone their surveillance techniques, disseminate cutting-edge propaganda, and pacify their populations with digital...
Author
Language
English
Formats
Description
The official spin on numerous government programs is flat-out bullshit, according to Jesse Ventura. In this incredible collection of actual government documents, Ventura, the ultimate non- partisan truth-seeker, proves it beyond any doubt. He and Dick Russell walk readers through 63 of the most incriminating programs to reveal what really happens behind the closed doors. In addition to providing original government data, Ventura discusses what it...
5) Zero days
Author
Language
English
Formats
Description
"A new and dangerous computer bug is sweeping the internet. But this bug is different. Smart, quick, sophisticated, and developed by elite hackers working for a cybercrime syndicate, it can break through an unknown flaw in the world's most secure computer chips and cripple any system within seconds - the ultimate cyber weapon. Reluctant American cyber sleuth Chuck Drayton unwittingly finds himself caught in the deadly crossfire of an unfolding cyber...
Pub. Date
2014.
Language
English
Description
Be prepared: Value of HIPAA risk assessment. A comprehensive security risk assessment is an important and necessary strategy for health care organizations to identify gaps in their privacy and security environments. While risk assessments alone do not directly mitigate data breaches, risk exposure decreases significantly when an organization knows exactly where protected health information (PHI) resides and how it is handled. We will cover reasons...
Author
Pub. Date
[2023]
Edition
First edition.
Language
English
Description
"A captivating study of US state secrecy that examines how officials use it to hoard power and prevent meaningful public oversight The United States was founded on the promise of a transparent government, but time and again we have abandoned the ideals of our open republic. In recent history, we have permitted ourselves to engage in costly wars, opened ourselves to preventable attacks, and ceded unaccountable power to officials both elected and unelected....
Author
Pub. Date
2015.
Language
English
Description
"The book's content is based on McKinsey's proprietary research, client experience and interviews with over 200 executives, regulators and security experts. This effort has four main findings: Pervasive digitization, open and inter-connected technology environments and sophisticated attackers make cyber-attacks a critical social and business issue that could materially slow the pace of technology and bushiness innovation with as much as $3 trillion...
Author
Pub. Date
[2019]
Language
English
Description
"Begins with an introduction to information security, including key topics such as confidentiality, integrity, and availability, and then moves on to practical applications of these ideas in the areas of operational, physical, network, application, and operating system security"--
Interlibrary Loan
Didn't find what you need? Items not owned by Main Library Alliance members might be available in other libraries across New Jersey. You can search JerseyCat and place a request for the item to be sent to your library.
If your library doesn't permit JerseyCat requests or the item can't be found, you can also contact your library for assistance.Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request