Search:

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / by Mitnick, Kevin D.(Kevin David),1963-author.; Vamosi, Robert,author.;
Includes bibliographical references and index.
Subjects: Internet; Computer security.; Data protection.; Privacy, Right of.;
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime - and how to protect your business / by Sangster, Mark,author.;
Includes bibliographic references and index."Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."--
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

This is how they tell me the world ends : the cyber-weapons arms race / by Perlroth, Nicole,author.;
Includes bibliographical references and index."From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market--the most secretive, invisible, government-backed market on earth--and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--
Subjects: Cyberterrorism.; Cyberterrorism; Cyberspace operations (Military science); Data protection; Intellectual property infringement.; Computer crimes.; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

City spies / by Ponti, James.;
Sara Martinez is facing years in the juvenile detention system for hacking into the foster care computer system to prove that her foster parents are crooks. But then she gets a second chance when a mysterious man offers her a chance to join a group of MI6 affiliated spies.Ages 8-12.LSC
Subjects: Spy stories.; Adventure fiction.; Foster children; Hackers; Conduct of life;
Available copies: 1 / Total copies: 1
unAPI

Moving target : a novel / by Preisler, Jerome.; Clancy, Tom,1947-2013.; Pieczenik, Steve R.;
To prevent global chaos, Net Force agent Kali Alcazar, a member of America's elite cyber-defense organization, leads a final strike against the world's most dangerous hacker, discovering too late that he has prepared a deadly trap for them all.
Subjects: Political fiction.; Thrillers (Fiction); Cyber intelligence (Computer security); Cyberterrorism; National security; Adventure stories;
Available copies: 1 / Total copies: 1
unAPI

Clive Cussler's Dark vector : a novel from the NUMA files / by Brown, Graham,1969-author.; Cussler, Clive,creator.;
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 1 / Total copies: 2
unAPI

Clive Cussler's Dark vector [sound recording] : a novel from the NUMA files / by Brown, Graham,1969-author.; Brick, Scott,narrator.; Cussler, Clive,creator.; Penguin Audio (Firm),publisher.;
Read by Scott Brick."A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Audiobooks.; Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 1 / Total copies: 1
unAPI

Shades of mercy / by Borgos, Bruce,author.;
"In the usually quiet high desert of Nevada, Sheriff Porter Beck faces one of his greatest challenges-a series of unlikely, disturbing and increasingly deadly events of unknown origins. Porter Beck is the sheriff in the high desert of Nevada, doing the same lawman's job his father once did now that he's returned home after decades away. With his twelve person department, they cover a large area that is usually very quiet, but not of late. One childhood friend is the latest to succumb to a new wave of particularly strong illegal opioids, another childhood friend-now an enormously successful rancher-is targeted by a military drone, hacked and commandeered by an unknown source. The hacker is apparently local-local enough to call out Beck by name-and that means they are Beck's problem. Beck's investigation leads him to Mercy Vaughn, the one known hacker in the area. The problem is that she's a teenager, locked up with no computer access at the secure juvenile detention center. But there's something Mercy that doesn't sit quite right with Beck. But when Mercy disappears, Beck understands that she's in danger and time is running out for all of them"--
Subjects: Detective and mystery fiction.; Novels.; Criminal investigation; Drone aircraft; Hackers; Hacking; Missing persons; Murder; Opioids; Sheriffs;
Available copies: 1 / Total copies: 1
unAPI

Six degrees of freedom / by Dickner, Nicolas,1972-author.; Lederhendler, Lazer,1950-translator.; translation of:Dickner, Nicolas,1972-Six degrés de liberté.English.;
"A novel featuring obsession and adventure, science experiments and parakeets, coding and container ships, Six Degrees of Freedom was the winner of the Governor General's Literary Award in its original French-language version. Nicolas Dickner is a previous winner of Canada Reads for the novel Nikolski. Three characters, three separate paths to freedom. Lisa is a young woman with an eccentric and absent mother and a father slowly succumbing to Alzheimer's. Lisa's friend Éric is an agoraphobic hacker who ends up getting rich in Denmark before his eighteenth birthday. And Jay is a former computer pirate who's paying her debt to society, day by stultifiying day, working for the RCMP in Montreal. But when Jay learns of the existence of the mysterious ship container Papa Zulu she begins a clandestine investigation to discover who made it disappear and what they are trying to hide."--Winner of the 2015 French-language Governor General's Literary Award for Fiction
Subjects: Stowaways; Hackers; Voyages around the world; Ocean travel;
Available copies: 1 / Total copies: 1
unAPI

Someone we know / by Lapeña, Shari,1960-author.;
In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well. Learning their secrets, and maybe sharing some of them, too. Who is he, and what might he have uncovered? As whispers start to circulate, suspicion mounts. And when a woman down the street is found murdered, the tension reaches its breaking point. Who killed her? Who knows more than they're telling? And how far will all these very nice people go to protect their little secrets? In this neighbourhood, it's not just the husbands and wives who play games. Here, everyone in the family has something to hide.
Subjects: Thrillers (Fiction); Psychological fiction.; Family secrets; Secrecy; Suburban life; Neighbors; Hackers; Murder;
Available copies: 2 / Total copies: 3
unAPI