Catalog Search Results
Compare before you buy with unbiased reviews and ratings on thousands of products. Part of EBSCO's MasterFile Elite, find full-text articles from current and past editions of Consumer Reports magazine. Use the search to quickly find what you need!
Author
Series
Formats
Description
Need networking know-how, but don't know where to turn? Run-don't walk-to the no-nonsense networking guidance offered in this friendly guide! Whether you're a networking administrator or an everyday computer user looking to set up a network in your home or office, Networking For Dummies, seamlessly gets you connected with the basics and gives you the knowledge to work out whatever kinks may come your way-in no time.
A network can make everything...
2) The matrix
Description
A computer hacker realizes the world is a hoax, an elaborate deception spun by all-powerful machines of artificial intelligence that control us.
Author
Series
Formats
Description
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
- The who and why of cybersecurity threats
- Basic cybersecurity concepts
- What to do to be cyber-secure
-...
Author
Series
Formats
Description
Many of today's communications travel over networks. Networks connect people all over the world through computers and mobile devices, but how does it work? Young learners will discover how an email works, how computers talk to one another, and how documents and programs are stored in the cloud. Readers will also learn about network safety and how to protect themselves from hackers and viruses. Easy-to-read infographics and simple language make this...
Author
Formats
Description
The ability to talk, play a game, or share music with someone on the other side of the world is quite the technological feat. This fascinating book explores the vast communication that allows computers all over the world to share data. Students will discover Wi-Fi, radio waves, telecommunications, and the differences between a wired and wireless network. Readers will learn about the biggest computer network, the internet, and better understand how...
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Author
Formats
Description
"A New York Times Magazine writer explores the Next Big Thing in tech--the impending revolution in voice recognition--and shows how it will upend Silicon Valley and transform how we use computers, the Web, and much more. Every decade or so brings a seismic shift in how people interact with tech, from the PC to the internet to the smartphone. James Vlahos shows that we are on the cusp of the next shift: to voice computing. Siri and Alexa are early...
Author
Formats
Description
In David Ignatius's gripping new novel, spies don't bother to steal information... they change it, permanently and invisibly. Graham Weber has been director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber isn't sure where to turn until he meets a...
Author
Series
Formats
Description
Printing words in books originated in China with the invention of movable type. But books aren't the only way we've communicated throughout history. Find out who invented the first radio, which complicated code took 267 years to crack, and how cloth weaving inspired computer programs. Fact-packed text and fun illustrations reveal wacky inventions (a machine that translates your dog's barks!) and wayward predictions (the Internet was supposed to collapse...
Author
Description
"This important book explains how the code behind social media networks connects people around the world. Young readers will learn how networks are built using algorithms, how they communicate using messaging systems, and how privacy settings, IP addresses, and cookies work. The dangers of talking to strangers online are discussed, and readers are encouraged to think about how to participate on social networks safely and responsibly"--Provided by...
In Interlibrary Loan
Didn't find what you need? Items not owned by Ajax Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request