Search:

Watch dogs [electronic resource]. by Microsoft Corporation.; Ubisoft (Firm);
Game.Play as Aiden Pearce, a brilliant hacker and former thug, whose criminal past led to a violent family tragedy. Now on the hunt for those who hurt your family, monitor and hack all who surround you by manipulating everything connected to the city's network. Access omnipresent security cameras, download personal information to locate a target, control traffic lights and public transportation to stop the enemy ... and more. Use the city of Chicago as your ultimate weapon and exact your own style of revenge.ESRB Content Rating: M, Mature, 17+ (Blood, Intense violence, nudity, strong language, strong sexual content, use of drugs and alcohol).Blu-ray disc compatible with Xbox One console ; HDTV 720p/1080i/1080p ; in game Dolby Digital ; content download ; 2-8 player online multiplayer with leaderboards and voice (paid subscription and broadband internet connection required).
Subjects: Computer adventure games; Computer games.; Computer hackers; Video games.; Watch dogs (Game); Xbox One (Video game console);
© c2013., Microsoft Corp.,
Available copies: 1 / Total copies: 2
unAPI

Teach yourself visually MacBook Pro and MacBook Air / by Hart-Davis, Guy,author.;
"Teach Yourself Visually MacBook Pro and MacBook Air covers all the vital information you need to start working on your MacBook. With this highly illustrated and easy-to-follow guide, you'll learn to navigate the macOS interface like a pro; customize your desktop with the widgets you need; and get your MacBook working with iCloud, your iPhone, and your iPad. This book's graphical, step-by-step instructions walk you through everything from installation to troubleshooting, helping you to get the most out of the investment you've made in your MacBook. This fully updated edition helps you become a power user of the latest MacBook models and exploit the features in macOS Sonoma, Apple's state-of-the-art operating system, and the apps that come with it. If you prefer to learn visually, this is the book you need. Get up to speed with the latest macOS version, Sonoma, and its new features: perform everyday tasks quickly and easily; customize settings to make macOS and its apps work the way you prefer; communicate via audio and video with FaceTime, via instant messaging with Messages, and via email with Mail; organize your life with Calendar, Contacts, Reminders, Notes, and Maps; and make the most of your iCloud account. Instead of confusing tech-speak and vague instructions, this guide is packed with screenshots, easy-to-follow instructions, and a practical sensibility."--
Subjects: Handbooks and manuals.; MacBook (Computer); MacBook Air (Computer); MacBook Pro (Computer); Laptop computers.; Macintosh (Computer);
Available copies: 1 / Total copies: 1
unAPI

Kingdom of lies : unnerving adventures in the world of cybercrime / by Fazzini, Kate,author.;
Includes bibliographical references and index.In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected cultures of hackers, security specialists, and law enforcement. A 19-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions--without knowing the first thing about computers. A veteran cybersecurity specialist has built a deep network of top notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny New Jersey apartment to hack sports cars at a high performance shop in Newark. But he opens his door to a consultant who needs his help. A hotel doorman in China once served in the People's Army, stealing intellectual property from American companies. Now he uses his skills to build up a private side-business selling the data he takes from travelers to Shanghai's commercial center. Kingdom of Lies follows the intertwined stories of cybercriminals and ethical hackers as they jump from criminal trend to criminal trend, crisis to crisis. A cybersecurity professional turned journalist, Kate Fazzini illuminates the many lies companies and governments tell us about our security, the lies criminals tell to get ahead, and the lies security leaders tell to make us think they are better at their jobs than they are.
Subjects: True crime stories.; Computer crimes.; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

The sisterhood : the secret history of women at the CIA / by Mundy, Liza,1960-author.;
Includes bibliographical references and index."The New York Times bestselling author of Code Girls reveals the untold story of how women at the CIA ushered in the modern intelligence age, a sweeping story of a "sisterhood" of women spies spanning three generations who broke the glass ceiling, helped transform spycraft, and tracked down Osama Bin Laden. Upon its creation in 1947, the Central Intelligence Agency instantly became one of the most important spy services in the world. Like every male-dominated workplace in Eisenhower America, the growing intelligence agency needed women to type memos, send messages, manipulate expense accounts, and keep secrets. Despite discrimination--even because of it--these clerks and secretaries rose to become some of the shrewdest, toughest operatives the agency employed. Because women were seen as unimportant, they moved unnoticed on the streets of Bonn, Geneva, and Moscow, stealing secrets under the noses of the KGB. Back at headquarters, they built the CIA's critical archives--first by hand, then by computer. These women also battled institutional stereotyping and beat it. Men argued they alone could run spy rings. But the women proved they could be spymasters, too. During the Cold War, women made critical contributions to U.S. intelligence, sometimes as officers, sometimes as unpaid spouses, working together as their numbers grew. The women also made unique sacrifices, giving up marriage, children, even their own lives. They noticed things that the men at the top didn't see. In the final years of the twentieth century, it was a close-knit network of female CIA analysts who warned about the rising threat of Al Qaeda. After the 9/11 attacks, women rushed to join the fight as a new job, "targeter," came to prominence. They showed that painstaking data analysis would be crucial to the post-9/11 national security landscape--an effort that culminated spectacularly in the CIA's successful efforts to track down Osama Bin Laden and, later, Ayman al-Zawahiri. With the same meticulous reporting and storytelling verve that she brought to her New York Times bestseller Code Girls, Liza Mundy has written an indispensable and sweeping history that reveals how women at the CIA ushered in the modern intelligence age"--
Subjects: Biographies.; Personal narratives.; United States. Central Intelligence Agency; Espionage, American; Intelligence service; Women intelligence officers; Women spies;
Available copies: 1 / Total copies: 1
unAPI