Catalog Search Results
Author
Pub. Date
2018.
Description
Three initiatives integrate cyber security resources to protect Colorado elections: 1) Securing the statewide voter registration system; 2) Securing overseas and military ballot return with encryption; 3) Colorado threat information sharing and joint fusion center. These initiatives make Colorado one of the safest states to cast a ballot resulting in one of the highest voter turnout.
Author
Series
Pub. Date
[2020]
Description
Using technology may come naturally to many young people, but that doesn't mean they're able to identify online risks. In this book, readers will learn how to spot and avoid hazards online. Being alert and aware helps Internet users protect their personal information, dodge scams, evaluate the credibility of websites, and safely connect with others. This simple guide to navigating the Internet with confidence provides tips and tricks for alert users....
Pub. Date
[2017]
Description
The recent announcement regarding the data breach at Equifax has many people concerned about how to respond and protect your identity from ID thieves. Equifax is just the most recent of a number of data breaches that have impacted the majority of Americans. Here are some steps we recommend everyone take to protect yourself and your family from ID thieves and data breaches.
Author
Series
Hugo Marston novels volume 1
Pub. Date
[2012]
Description
Max-an elderly Paris bookstall owner-is abducted at gunpoint. His friend, Hugo Marston, head of security at the US embassy, looks on helplessly, powerless to do anything to stop the kidnapper. Marston launches a search, enlisting the help of semiretired CIA agent Tom Green. Their investigation reveals that Max was a Holocaust survivor and later became a Nazi hunter. Is his disappearance somehow tied to his grim history, or even to the mysterious old...