Catalog Search Results
Author
Publisher
linkedin.com
Pub. Date
2017.
Language
English
Description
Discover strategies to protect against digital data theft. Learn about email protection, securing files by default, and controlling files by design.
Businesses, government agencies, and private citizens are losing the digital data war. Every day brings reports of new breaches, identity theft, stolen intellectual property, military and diplomatic secrets divulged, financial fraud, or humiliating disclosures made by a hacktivist collective. Losses...
Author
Publisher
linkedin.com
Pub. Date
2023.
Language
English
Description
Explore techniques for building secure ASP.NET Core applications and protecting them against common attacks.
Software security is a critical consideration when designing and developing web applications. While security breaches and threats can have serious consequences, there are a handful of steps you can take as a software developer to ensure you keep your applications safe. In this course, instructor Ervis Trupja covers practical techniques for...
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Learn how to implement enterprise-class disaster recovery with System Center 2016 Data Protection Manager.
System Center 2016 Data Protection Manager (DPM) provides a centralized, enterprise-class solution for disaster recovery. With DPM, you can back up multiple hosts: Hyper-V, VMware, and Azure virtual machines; Windows client and server operating systems; SQL Server; Exchange and SharePoint servers; and Linux virtual machines, just to name just...
Author
Language
English
Description
"The essential road map for understanding-and defending-your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights advocate Danielle Citron has spent decades working with lawmakers...
Author
Language
English
Description
"April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools"--
Author
Publisher
linkedin.com
Pub. Date
2024.
Language
English
Description
Learn about data protection to prepare for the AWS Certified Security - Specialty (SCS-C02) exam.
The AWS Certified Security - Specialty (SCS-C02) exam is intended for individuals who currently work in or hope to someday land a cybersecurity role. The exam validates your ability to effectively demonstrate knowledge related to securing the AWS platform. This course, the fifth in a six-part learning path designed to help you prepare for the exam, focuses...
Author
Publisher
Teaching Company
Pub. Date
2020.
Language
English
Description
Never before in human history have people been able to share so much about themselves so quickly. Neither have they ever been so exposed to forces that want to take advantage of that capability. This course will open eyes to the surprising extent of that exposure and will discuss options for keeping personal data as safe as possible, help to determine personal privacy profile, and understand the current U.S. laws and proposed state laws regarding...
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
[2023]
Language
English
Description
Data Governance For Dummies offers an accessible first step for decision makers into understanding how data governance works and how to apply it to an organization in a way that improves results and doesn't disrupt. Prep your organization to handle the data explosion (if you know, you know) and learn how to manage this valuable asset. Take full control of your organization's data with all the info and how-tos you need. This book walks you through...
Author
Series
Language
English
Formats
Description
Welcome to the cybersecurity (also called information security or InfoSec) field! If you are interested in a career in cybersecurity, you've come to the right book. So what exactly do these people do on the job, day in and day out? What kind of skills and educational background do you need to succeed in this field? How much can you expect to make, and what are the pros and cons of these various professions? Is this even the right career path for you?...
Author
Publisher
Annick Press
Pub. Date
[2017]
Language
English
Description
"This book looks at the way information and data is collected and used by individuals, governments, companies, and organizations. Arguments for both increased security and increased privacy are offered, encouraging readers to think critically about the issues. Topics relevant to children are included, such as being tracked at school, cyberbullying, and online safety."--
Author
Publisher
Rowman & Littlefield
Pub. Date
[2014]
Language
English
Description
Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
Author
Publisher
Pegasus Books
Pub. Date
2016.
Language
English
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...
Author
Publisher
Melville House
Pub. Date
[2021]
Language
English
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
Author
Publisher
The Teaching Company
Pub. Date
[2016]
Language
English
Description
A course of 24 lectures by Professor Paul Rosenzweig.
Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of drones, and then consider policy issues such as what factors constitute permissible use of drone footage. Review three types of surveillance-physical, electronic and data-and see how each type works. Review some of the many public and private uses of...
Author
Series
Publisher
KidHaven Pub
Pub. Date
2022.
Language
English
Description
"Fears about terrorism and other safety concerns have been prevalent for decades, but recent advancements in technology have given law enforcement and national security officials the ability to monitor suspected criminals. Some people believe this is not only desirable, but necessary. Others worry about the ways this power could potentially be abused. The many angles of conflict between safety and privacy are presented to readers through compelling...
Author
Publisher
Adams Media
Pub. Date
2019.
Language
English
Description
"We all know that the Internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store--and even you have the ability to unknowingly reveal your private information to everyone...
Author
Publisher
Atlantic Monthly Press
Pub. Date
2018.
Language
English
Description
"Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly...
Author
Language
English
Formats
Description
"Targeted is Kaiser's eyewitness chronicle of the dramatic and disturbing story of the rise and fall of Cambridge Analytica. She reveals to the public how Facebook's lax policies and lack of sufficient national laws allowed voters to be manipulated in both Britain and the United States, where personal data was weaponized to spread fake news and racist messaging during the Brexit vote and the 2016 election. But the damage isn't done Kaiser warns; the...
In Marina
Didn't find what you need? Items that were published more than six months ago and which are not owned by AACPL can be requested from other Marina libraries in Maryland.
Didn't find a newly published title?
Looking for a title that was published in the past six months? You can submit a purchase suggestion. Please do not submit purchase suggestions for titles that have not yet been published. Submit Request