Catalog Search Results
Author
Description
Learn about the ethics of working in cybersecurity and how to have challenging conversations about those ethics.
Cybersecurity professionals frequently find themselves at the center of moral and ethical debates about what they do and how they go about doing it. This course can help cybersecurity professionals better understand the ethics of working in cybersecurity, the expectations that various stakeholders are likely to have, and the challenging...
Author
Description
Learn how to make informed, ethical decisions on how to use your customer data.
Technology provides businesses with real insight into customer’s thoughts, desires, and behaviors. But this unprecedented access can pose real ethical dilemmas. Can you sell customer data to other companies? Can you charge different customers more for the same product? The answers will define your organization. Yet many of these decisions aren’t happening in the boardroom....
Author
Description
The Beloved Classic on What All Christians Believe
One of the most popular introductions to Christian faith ever written, Mere Christianity brings together Lewis's legendary broadcast talks during World War Two. Here, Lewis provides an unequaled opportunity for believers and nonbelievers alike to hear a powerful, rational case for the Christian faith.
A collection of scintillating brilliance, Mere Christianity remains
...Author
Description
Popular Harvard professor Michael Sandel offers a searching, lyrical exploration of the meaning of justice that considers familiar controversies such as affirmative action, same-sex marriage, physician-assisted suicide, abortion, national service, patriotism and dissent, and the moral limits of markets in fresh and illuminating ways.
Author
Appears on these lists
Formats
Description
"Isaiah is now the big man of the house. But it's a lot harder than his dad made it look. His little sister, Charlie, asks too many questions, and Mama's gone totally silent. Good thing Isaiah can count on his best friend, Sneaky, who always has a scheme for getting around the rules. Plus, his classmate Angel has a few good ideas of her own--once she stops hassling Isaiah. And when things get really tough, there's Daddy's journal, filled with stories...
Author
Description
Her name was Henrietta Lacks, but scientists know her as HeLa. She was a poor Southern tobacco farmer, yet her cells--taken without her knowledge--became one of the most important tools in medicine. The first "immortal" human cells grown in culture, they are still alive today, though she has been dead for more than sixty years. HeLa cells were vital for developing the polio vaccine; uncovered secrets of cancer and viruses; helped lead to in vitro...
Author
Description
The phrase "skin in the game" is one we have often heard but have rarely stopped to truly dissect. It is the backbone of risk management, but it's also an astonishingly complex worldview that, as Nassim Nicholas Taleb shows in this book, applies to literally all aspects of our lives. In his inimitable style, Taleb pulls on everything from Antaeus the Giant to Hammurabi to Donald Trump to Seneca to the ethics of disagreement to create a jaw-dropping...
Author
Description
Become an ethical hacker. Learn how to detect network vulnerabilities to prevent attacks on your organization's infrastructure and data.
After footprinting and reconnaissance, scanning is the second phase of information gathering that hackers use to size up a network. Network scans are a key tool in the arsenal of ethical hackers, who work to prevent attacks on an organization's infrastructure and data. This course investigates the scanning tools...
15) Business Ethics
Author
Description
Ethics are critical to your career and your company. Learn how to hold yourself, your stakeholders, and your colleagues to ethical standards and avoid common ethical issues.
Ethical behavior is critical to the success of your career and your company. But ethics are not always black and white. Many factors can affect how people respond in ethically gray situations, including conflicts of interest, fear of failure, and business pressure. To ensure...
Author
Description
Learn the concepts, tools, and techniques behind footprinting: ethical hacking techniques for finding information about computers and the people they belong to.
Ethical hackers use their knowledge for good: to test if an organization's network is vulnerable to outside attacks. But where do they start? With footprinting and reconnaissance—the process of gathering information about computers and the people to which they belong. In this course, Lisa...
Description
Real Life Teens is an unbiased and realistic look from the perspective of teens, at the wide variety of issues teens face today featuring young teenagers telling their real stories, in their own words. The series discusses significant issues in adolescent society and cuts through many barriers with its honest and relevant advice and information. Many times it can be hard for teens to develop a positive code of ethics in school. This program discusses...
Author
Description
Learn about ethical hacking, a desired skill for any IT security professional, with a focus on a Module 1, Introduction to Ethical Hacking, of the Certified Ethical Hacker (CEH) exam.
Ethical hacking tests the strength of an organization's defenses and is a desired skill for any IT professional. In this course, security expert Lisa Bock explains how to protect data in a digital world and covers the basics of Information security. She begins by discussing...
Author
Description
Improve your information literacy. Learn about strategies for finding information—from a library, archive, database, or the Internet—and the ethics of using what you find.
Information literacy is the ability to discover and use various types of information. It's an essential skill for navigating the information age. Watch this course to learn about strategies for finding information—from a library, archive, database, or the Internet—and the...
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request