Catalog Search Results
Author
Language
English
Formats
Description
Claypoole and Payton describe the implications of people's online personas and reputations. They offer a guide to the many pitfalls and risks of certain online activities, and provide a roadmap to taking charge of online reputation for personal and professional success.
Author
Language
English
Formats
Description
"Kids deserve a better digital future. Help them create it. When it comes to raising children in a digital world, every parent feels underprepared and overwhelmed. We worry that our children will become addicted to online games, be victims of cyberbullying, or get lost down the rabbit hole of social media. We tell them time and again what not to do and list dangers to avoid when online. But this is only a piece of the story. Technology can be a powerful...
Author
Language
English
Formats
Description
"Two leading reputation experts reveal how the internet is being used to destroy brands, reputations and even lives, and how to fight back. From false Wikipedia entries, to fake YouTube videos, to Facebook lynch mobs, everyone from CEOs to fashion models, journalists to politicians, restaurateurs to doctors, is open to character assassination in the burgeoning realm of digital media. Two top media experts recount vivid tales of character attacks,...
Author
Series
Language
English
Description
A child can't make tea if you don't teach them how to boil water.
A child can't walk to school alone unless we teach them to safely cross the road.
A child can't read unless we teach them the alphabet.
A child can't swim unless we teach them to float.
Digital skills are foundational too.
In this digital age, how do you protect kids on the Internet? Things have changed so much in the last few years. Dangers lie in social media and within apps. The...
Author
Series
Language
English
Description
Asset Security is one of the eight domains of the Certified Information Systems Security Professional certification, or as it is commonly referred to as the CISSP. Asset Security has 6 domains namely; Information and Asset classification, Data and System ownership, Privacy protection, Appropriate retention, Data security controls. And Handling requirements.
Author
Series
Language
English
Description
Security Operations is the 7th domain of the CISSP's common body of knowledge. In this course we will cover some of the following topics: digital forensics, incident management, logging and monitoring, vulnerability and change management, investigative types, evidence handling an, recovery strategies, personnel privacy and safety, business continuity and disaster recovery, internal physical security, external physical security, and securing assets....
Author
Language
English
Description
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website...
Author
Language
English
Formats
Description
"This book traces the history of the right to anonymous speech in America, dating back to the pseudonymous publication of the Federalist Papers and other foundational political writings. It examines how courts have recognized a First Amendment right to anonymity, and how that right has shaped the Internet that we know today"--
Author
Language
English
Description
The purpose of this document is to describe the method by which the security controls will be assessed. In addition, the test methodology, test procedures, and test tools are described to ensure consistency and repeatability of the assessment process. The execution of this plan provides the assessment results, which are used as the basis for the decision by the Authorizing Official. An assessment of the system is a requirement of the Federal Information...
Author
Language
English
Description
The technical awareness of the legal system with regards to cloud technologies is increasing. The courts are beginning to take a useful, pragmatic and well balanced approach to evaluating the fairness and effectiveness of service provider T&C's in meeting customer information security requirements and obligations. The concept of what is reasonable is central to this balance. It is also nothing new. This after all is what corporate diligence is all...
Author
Language
English
Description
Your Personal Information is at Risk is a detailed, informative, and comprehensive book that explores the current various threats to the security of personal information. This information can be stored on phones or computers, and can also be accessed by scam artists calling a home and tricking people into sharing personal information. The author uses personal experience, as well as research, to describe current threats, and solutions to mitigate the...
Author
Language
English
Description
Are you frustrated with your computer? Bombarded by error messages? Did your uncle's neighbor's cat's cousin come over and install pirated software? Is your computer dreadfully slow? Don't bother buying a new one! In this book, you'll learn:
About viruses, spyware, toolbars, and spam
How fake cleaning programs turned the industry into a grease fire
(and how your local computer guy may be pouring water on it)
What really causes slow computers
How...
14) The Rise of the Computer State: The Threat to Our Freedoms, Our Ethics and our Democratic Process
Author
Language
English
Description
The Rise of the Computer State is a comprehensive examination of the ways that computers and massive databases are enabling the nation's corporations and law enforcement agencies to steadily erode our privacy and manipulate and control the American people. This book was written in 1983 as a warning. Today it is a history. Most of its grim scenarios are now part of everyday life. The remedy proposed here, greater public oversight of industry and government,...
Author
Language
English
Description
Wireless Hacking 101 - How to hack wireless networks easily! This book is perfect for computer enthusiasts that want to gain expertise in the interesting world of ethical hacking and that wish to start conducting wireless pentesting. Inside you will find step-by-step instructions about how to exploit WiFi networks using the tools within the known Kali Linux distro as the famous aircrack-ng suite. Topics covered: • Introduction to WiFi Hacking •...
Author
Series
Language
Español
Description
¿Por qué las mujeres suelen sentirse menos competentes cuando usan tecnología? ¿Por qué esto les pasa más a partir de cierta edad? ¿Es casualidad que en Wikipedia haya muchas más biografías de hombres? ¿Y que los asistentes virtuales tengan nombre de mujer? ¿Por qué casi todos los deep fakes son pornografía creada sin el permiso de las mujeres cuyas imágenes se usan?
Author
Language
English
Description
The disorganised array of modules available for Moodle are brought together in ways you can relate to. Reviews include details that will help you decide if a module is worth testing. There are illustrated, step-by-step guides to installing and configuring modules. If you are involved in teaching using Moodle, be it at relatively small institutions running their own Moodle instance, or at large institutions where Moodle is used and administered, or...
Author
Language
Español
Description
Amenazados presenta una advertencia urgente: mostrar los peligros que entraña Internet para todos quienes la utilizamos, pues ella es parte de nuestras vidas, casi como el aire que respiramos. Este libro es una invitación a conocerla por dentro, a internarse en las maravillosas posibilidades que ofrece, pero también en la naturaleza implacable del mal que inevitablemente trae consigo.
Amenazados es sobre todo una manera de conocer las condiciones...
Author
Series
Language
English
Description
Covers topics from what the dark web is, to how it works, to how you can use it, to some of the myths surrounding it.
Casting Light on the Dark Web: A Guide for Safe Exploration is an easy-to-read and comprehensive guide to understanding how the Dark Web works and why you should be using it! Readers will be led on a tour of this elusive technology from how to download the platform for personal or public use, to how it can best be utilized for finding...
Author
Language
Deutsch
Description
Wie Sie Ihren Internetempfang optimieren können
Das Internet ist aus unserem Alltag nicht mehr wegzudenken. Wir nutzen es für die Arbeit, die Unterhaltung, die Kommunikation und vieles mehr. Doch was tun, wenn der Internetempfang zu langsam oder zu schwach ist? In diesem Buch zeige ich Ihnen, wie Sie Ihren Internetempfang optimieren können, indem Sie einige einfache Schritte befolgen.
Zunächst erkläre ich Ihnen, wie das Internet funktioniert...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request