|
Discover & Explore: Acid Wash Craft
|
School's Out! Naked Egg Experiment
|
|
|
Library Closures & Changes to Hours
|
|
New Books at Your Library
|
|
|
The sentinel
by Lee Child
A latest entry in the best-selling series, co-written with the author’s brother, finds Jack Reacher following his lizard-brain instincts on a seemingly uneventful night in Nashville, where a recently fired man nurses an increasingly violent grudge. Read by Scott Brick. Simultaneous.
|
|
Truly, madly, deeply : a novel
by Karen Kingsbury
Dividing his family with his decision to become a police officer, 18-year-old Tommy Baxter falls in love with a girl fighting for her life at the same time he uncovers devastating truths about his late grandfather. 200,000 first printing.
|
|
|
|
The Noel letters : from the Noel collection
by Richard Paul Evans
A latest entry in the best-selling series by the award-winning author of The Christmas Box explores themes of faith, love and redemption during an illuminating holiday season. 200,000 first printing.
|
|
House of correction : a novel
by Nicci French
Attempting to solve her own case from the confines of prison, a reclusive murder suspect from an English village uncovers evidence that calls her own sanity into question. By the best-selling authors of the Frieda Klein mysteries. Simultaneous. 50,000 first printing.
|
|
|
|
No safe harbor : The Inside Truth About Cybercrime: And How to Protect Your Business
by Mark Sangster
"Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stopcrime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure"
|
|
|
|
|
|