Catalog Search Results
Description
Library Security experts and staff members discuss practical security recommendations to create an effective security policy for your library. Examples are shown of staff correctly handling security problems, including approaching rule-breaking patrons, personal safety and patrons carrying weapons. "Recommended for all libraries." ~ Library Journal.
Author
Series
Formats
Description
If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached!
- The who and why of cybersecurity threats
- Basic cybersecurity concepts
- What to do to be cyber-secure
-...
Description
This program will show you recommended ways of handling difficult situations that your library and staff may encounter. Among the issues covered are potentially violent patrons, bomb threats, sexual harassment, and inappropriate Internet browsing. "Highly recommended ..." - Video Librarian.
Author
Description
Popcorn, the friendliest chicken at Fiddlesticks Farm, finds a forgotten smartphone in the farm, and is soon spending all day and all night exchanging messages with exciting new friends, and ignoring her old friends, the farm animals. When she invites her new friends to meet her at the farm, they are not quite what she expects, but the farm animals step in to save her from disaster.
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
10) Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world
Author
Formats
Description
The technology likely to have the greatest impact on the future of the world economy has arrived, and it’s not self-driving cars, solar energy, or artificial intelligence.
It’s called the blockchain.
The first generation of the digital revolution brought us the Internet of information. The second generation—powered by blockchain technology—is bringing us the Internet of value:...
It’s called the blockchain.
The first generation of the digital revolution brought us the Internet of information. The second generation—powered by blockchain technology—is bringing us the Internet of value:...
12) A woman alone
Author
Description
A year after a home invasion that shattered her previous life, Cecelia and her family move into a new house with a complex security system. Everything seems perfect, until Cecelia begins to feel spied upon, and the security system reveals a shocking secret about the prior occupant of their house.
Author
Formats
Description
In David Ignatius's gripping new novel, spies don't bother to steal information... they change it, permanently and invisibly. Graham Weber has been director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber isn't sure where to turn until he meets a...
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Series
Formats
Description
A child can't make tea if you don't teach them how to boil water.
A child can't walk to school alone unless we teach them to safely cross the road.
A child can't read unless we teach them the alphabet.
A child can't swim unless we teach them to float.
Digital skills are foundational too.
In this digital age, how do you protect kids on the Internet? Things have changed so much in the last few years. Dangers lie in social media and within apps. The...
Author
Description
"This important book explains how the code behind social media networks connects people around the world. Young readers will learn how networks are built using algorithms, how they communicate using messaging systems, and how privacy settings, IP addresses, and cookies work. The dangers of talking to strangers online are discussed, and readers are encouraged to think about how to participate on social networks safely and responsibly"--Provided by...
20) The phone book: stay safe, be smart, and make the world better with the powerful device in your hand
Author
Description
So . . . you got a phone! You can text your friends, play games, and take cool pictures! You have the whole world in your pocket-power to be used as a force for good or, um, not so good. Fraught with cyberbullying, disinformation, fake stuff, tech addiction, and so much more, the digital world can be downright sad, awkward, and nasty. But have no fear, kids-The Phone Book is here! Packed with research-based explanations, techy tidbits, and real stories...
In Interlibrary Loan
Didn't find what you need? Items not owned by Ajax Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request