Results 11 to 20 of 64 | « previous | next »
- Click here to kill everybody : security and survival in a hyper-connected world / by Schneier, Bruce,1963-author.;
Includes bibliographical references and index."The Internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the Internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--
- Subjects: Computer crimes.; Internet; Internet; Internet;
- Available copies: 1 / Total copies: 1
-
unAPI
- Wired / by Garwood, Julie,author.;
"A beautiful computer hacker and a bad-boy FBI agent must collaborate -- in more ways than one -- in the sizzling new novel from #1 New York Times bestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing -- and hacking -- code. Her dream is to write a new security program that could revolutionize the tech industry. Hotshot FBI agent Liam Scott has a problem: a leak deep within his own department. He needs the skills of a top-notch hacker to work on a highly sensitive project: to secretly break into the FBI servers and find out who the traitor is. But he can't use one of his own. He finds the perfect candidate in Allison. Only, there's one problem -- she wants nothing to do with his job and turns him down flat. What Liam doesn't know is that Allison is hiding secrets that she doesn't want the FBI to uncover. But Liam will do nearly anything to persuade her to join his team, even break a few rules if that's what it takes. A temptation that could put his job -- and both of their futures -- on the line"--
- Subjects: Thrillers (Fiction); Romance fiction.; United States. Federal Bureau of Investigation; Computer crimes;
- Available copies: 1 / Total copies: 1
-
unAPI
- The Director : a novel / by Ignatius, David,1950-;
-
- Subjects: Spy stories.; United States. Central Intelligence Agency; Computer crimes; Computer hackers; Computer networks;
- Available copies: 1 / Total copies: 1
-
unAPI
- Chasing shadows : cyber espionage, subversion, and the global fight for democracy / by Deibert, Ronald,author.;
Includes bibliographical references and index."In this real-life espionage thriller, cyber security expert Ronald Deibert uncovers the unseemly marketplace for high-tech surveillance, professional disinformation, and computerized malfeasance and reveals how his team of digital sleuths at the Citizen Lab have lifted the lid on dozens of spy cases targeting innocent citizens around the world. He recounts how the Lab exposed the world's pre-eminent cyber-mercenary firm, Israel-based NSO Group -- the creators of the phone-hacking marvel Pegasus -- in a series of human rights abuses, from domestic spying scandals in Spain, Poland, Hungary, and Greece to its implication in the murder of Washington Post journalist Jamal Khashoggi in 2018. Today, NSO Group, once valued at over a billion dollars, faces plummeting worth and an irretrievably tarnished reputation. Chasing Shadows provides a front-row seat to a dark underworld of digital espionage, sabotage, and subversion where autocrats and dictators peer into their targets' lives with the mere press of a button, spreading their tentacles of authoritarianism through a digital ecosystem that is insecure, invasive by design, poorly regulated, and prone to abuse. The brave activists, opposition figures, and journalists who dare to advocate for basic political rights and freedoms are hounded, arrested, tortured, and sometimes murdered. From the gritty streets of Guatemala City to the corridors of power in the White House, this compelling narrative traces the journey of the Citizen Lab, a pioneering digital watchdog, as it evolved into a globally renowned source of counter-intelligence for civil society and whose exploits are routinely covered in the world's media. But as this small team of sleuths disarmed cyber mercenaries and helped to improve the digital security of billions of people worldwide, their success came with a price. The Citizen Lab's dogged investigations ultimately brought them, too, into the same sinister crosshairs that plagued the victims they worked to protect. Like a John Le Carré novel brought to life and updated for the digital age, this book is a powerful tale of high-stakes espionage, transnational intrigue, and the inevitable toll exacted when one dares to defy oligarchs and dictators. You'll never look at your smartphone the same way again"--
- Subjects: Munk Centre for International Studies. Citizen Lab.; Computer crimes.; Computer security.; Disinformation.; Electronic surveillance.; Espionage.; Intelligence service.;
- Available copies: 0 / Total copies: 1
-
unAPI
- Hush-hush / by Woods, Stuart,author.;
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll have to flush out the mastermind before he and those closest to him are silenced for good"--
- Subjects: Thrillers (Fiction); Barrington, Stone (Fictitious character); Private investigators; Computer crimes; Criminal investigation;
- Available copies: 1 / Total copies: 2
-
unAPI
- Hush-hush [sound recording] / by Woods, Stuart,author.; Roberts, Tony,narrator.; Penguin Audio (Firm),publisher.;
Read by Tony Roberts."Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll have to flush out the mastermind before he and those closest to him are silenced for good"--
- Subjects: Thrillers (Fiction); Audiobooks.; Barrington, Stone (Fictitious character); Computer crimes; Criminal investigation; Private investigators;
- Available copies: 1 / Total copies: 1
-
unAPI
- This is how they tell me the world ends : the cyber-weapons arms race / by Perlroth, Nicole,author.;
Includes bibliographical references and index."From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market--the most secretive, invisible, government-backed market on earth--and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--
- Subjects: Cyberterrorism.; Cyberterrorism; Cyberspace operations (Military science); Data protection; Intellectual property infringement.; Computer crimes.; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- 1st case / by Patterson, James,1947-author.; Tebbetts, Christopher,author.;
Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her--as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge William Keats--one of only two agents in the Northeast to make his rank before the age of thirty--sees in Angela a fellow prodigy. But Angela's skills come with a natural curiosity, which is also a dangerous liability. With little training, Angela is quickly plunged into a tough case: tracking murderous brothers who go by the Poet and the Engineer. When Keats tells her to "watch and listen," Angela's mind kicks into overdrive. The obsessive thinking that earned her As on campus can prove fatal in the field.
- Subjects: Thrillers (Fiction); United States. Federal Bureau of Investigation; Interns; Computer crimes; Brothers; Serial murderers;
- Available copies: 2 / Total copies: 4
-
unAPI
- 1st case [sound recording] / by Patterson, James,1947-author.; Pressley, Brittany,narrator.; Tebbetts, Christopher,author.; Hachette Audio (Firm),publisher.;
Read by Brittany Pressley.Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her--as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge William Keats--one of only two agents in the Northeast to make his rank before the age of thirty--sees in Angela a fellow prodigy. But Angela's skills come with a natural curiosity, which is also a dangerous liability. With little training, Angela is quickly plunged into a tough case: tracking murderous brothers who go by the Poet and the Engineer. When Keats tells her to "watch and listen," Angela's mind kicks into overdrive. The obsessive thinking that earned her As on campus can prove fatal in the field.
- Subjects: Thrillers (Fiction); Audiobooks.; United States. Federal Bureau of Investigation; Brothers; Computer crimes; Interns; Serial murderers;
- Available copies: 1 / Total copies: 1
-
unAPI
- Dark angel / by Sandford, John,1944 February 23-author.;
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
- Subjects: Thrillers (Fiction); Novels.; United States. Department of Homeland Security; Betrayal; Computer crimes; Government investigators; Hackers; Undercover operations;
- Available copies: 3 / Total copies: 5
-
unAPI
Results 11 to 20 of 64 | « previous | next »