Catalog Search Results
1) Sneakers
Publisher
Universal
Pub. Date
c2003
Physical Desc
1 DVD (125 min.) : sd., col. ; 4 3/4 in.
Description
A thriller about five computer hackers with questionable pasts and an equally questionable government job.
2) Zero days
Publisher
Magnolia Home Entertainment
Pub. Date
[2017]
Physical Desc
1 DVD (114 min.) : sound, color ; 4 3/4 in.
Description
Experts discuss the world of digital warfare, focusing on the Stuxnet virus which originally targeted an Iranian nuclear facility, but then spread and is capable of destroying infrastructure worldwide.
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
[2019]
Physical Desc
xvii, 346 pages : illustrations ; 24 cm.
Description
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity...
Author
Publisher
Simon & Schuster
Pub. Date
2021.
Physical Desc
304 pages
Description
"This tech-fueled war will shape the world's balance of power for the coming century as autocracies exploit twenty-first-century methods to re-divide the world into twentieth century-style spheres of influence. Helberg cautions that the spoils of this fight are power over every meaningful aspect of our lives, including our economy, our infrastructure, our national security, and ultimately, our national sovereignty. Without a firm partnership with...
Author
Series
Publisher
John Wiley & Sons, Inc
Pub. Date
2016-
Physical Desc
volumes ; cm.
Description
"Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other...
7) Zero days
Author
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To addto her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
8) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2022.
Physical Desc
355 pages.
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Publisher
Atlantic Pub. Group
Pub. Date
c2011
Physical Desc
288 p. : ill. ; 23 cm.
Description
Presents an introduction to different types of malware and viruses, describes antivirus solutions, offers ways to detect spyware and malware, and discusses the use of firewalls and other security options.
11) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends? and a lovely new tech-savvy acquaintance? Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Publisher
Doubleday
Pub. Date
[2015]
Physical Desc
viii, 392, lx pages ; 25 cm
Description
Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side. Criminals are often the earliest, and most innovative, adopters of technology, and modern times have led to modern crimes. Today's criminals are stealing identities, draining online bank accounts, and erasing computer servers. It's disturbingly easy to activate baby monitors to spy on families, to hack pacemakers to deliver a lethal jolt of electricity,...
13) Dark Web
Author
Series
Publisher
Harper Collins Publishers
Pub. Date
2019.
Physical Desc
12 CDs (14 hrs. 30 min.) : digital ; 4 3/4 in.
Description
The number one threat to the nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven, and officially unnamed, Net Force's elite group of...
Author
Series
Formats
Description
A remote Maine island becomes the setting for a deadly game of cat-and-mouse in {TITLE}.
Natasha Mori and Bryan Ferrago work for the Net Force Cyber Squad, an elite government agency created to lead the charge against America’s online enemies. They’ve traveled to Maine’s coast for a project to study extreme weather forecasting—and hopefully enjoy a little vacation.
But someone from Natasha’s past has followed them and, as a hurricane approaches,...
Author
Publisher
W.W. Norton & Company
Pub. Date
[2015]
Physical Desc
383 pages ; 24 cm
Description
You are under surveillance right now... your cell phone provider tracks your location, your online and in-store purchasing patterns are recorded, Facebook can determine your sexual orientation without you ever mentioning it. Corporations use surveillance to manipulate the prices we're offered; governments use surveillance to discriminate, censor, and put people in danger worldwide. Schneier shows what we can do to reform our government surveillance...
Author
Publisher
Harper Collins Publishers
Pub. Date
2021.
Physical Desc
10 CDs (11 hrs., 30 min.) : digital ; 4 3/4 in.
Description
A mysterious AI-controlled sub in the Black Sea, a sleeper agent in the Pacific and a gang of master international hackers threaten to throw the United States into chaos. America may seem safe from within. But far beyond its borders, a new enemy is rising: a global organization that aims to destroy the country's cybersecurity and wreak havoc on the nation. The president has tasked the new intelligence agency, Net Force, with sniffing out and putting...
18) Attack surface
Author
Series
Pub. Date
2020.
Formats
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
19) The director
Author
Pub. Date
2014
Formats
Description
"Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
Author
Publisher
Little, Brown
Pub. Date
2011
Physical Desc
xiv, 413 p. : ill. ; 25 cm.
Description
The world's most famous former computer hacker, now a security consultant, describes his life on the run from the FBI creating fake identities, finding jobs at a law firm and a hospital, and keeping tabs on his pursuers.
Didn't find it?
Can't find what you are looking for? Let us know! Suggest a Title