Search:

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / by Mitnick, Kevin D.(Kevin David),1963-author.; Vamosi, Robert,author.;
Includes bibliographical references and index.
Subjects: Internet; Computer security.; Data protection.; Privacy, Right of.;
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime - and how to protect your business / by Sangster, Mark,author.;
Includes bibliographic references and index."Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."--
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

This is how they tell me the world ends : the cyber-weapons arms race / by Perlroth, Nicole,author.;
Includes bibliographical references and index."From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market--the most secretive, invisible, government-backed market on earth--and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--
Subjects: Cyberterrorism.; Cyberterrorism; Cyberspace operations (Military science); Data protection; Intellectual property infringement.; Computer crimes.; Computer security.;
Available copies: 1 / Total copies: 1
unAPI

City spies / by Ponti, James.;
Sara Martinez is facing years in the juvenile detention system for hacking into the foster care computer system to prove that her foster parents are crooks. But then she gets a second chance when a mysterious man offers her a chance to join a group of MI6 affiliated spies.Ages 8-12.LSC
Subjects: Spy stories.; Adventure fiction.; Foster children; Hackers; Conduct of life;
Available copies: 1 / Total copies: 1
unAPI

Moving target : a novel / by Preisler, Jerome.; Clancy, Tom,1947-2013.; Pieczenik, Steve R.;
To prevent global chaos, Net Force agent Kali Alcazar, a member of America's elite cyber-defense organization, leads a final strike against the world's most dangerous hacker, discovering too late that he has prepared a deadly trap for them all.
Subjects: Political fiction.; Thrillers (Fiction); Cyber intelligence (Computer security); Cyberterrorism; National security; Adventure stories;
Available copies: 0 / Total copies: 1
unAPI

Gray day : my undercover mission to expose America's first cyber spy / by O'Neill, Eric,author.;
"A cybersecurity expert and former FBI "ghost" tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets. With zero training in face-to-face investigation, Eric found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies--and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a disturbing fondness for handguns. In the months that follow, Eric's self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches Eric the game of spycraft. Eric will just have to learn to outplay his teacher if he wants to win. A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage--and how we might begin to catch up"--
Subjects: Autobiographies.; Biographies.; Hanssen, Robert.; O'Neill, Eric.; United States. Federal Bureau of Investigation.; Cyber intelligence (Computer security); Spies; Spies; Intelligence service;
Available copies: 1 / Total copies: 1
unAPI

Clive Cussler's Dark vector : a novel from the NUMA files / by Brown, Graham,1969-author.; Cussler, Clive,creator.;
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 2 / Total copies: 2
unAPI

Clive Cussler's Dark vector [sound recording] : a novel from the NUMA files / by Brown, Graham,1969-author.; Brick, Scott,narrator.; Cussler, Clive,creator.; Penguin Audio (Firm),publisher.;
Read by Scott Brick."A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Audiobooks.; Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 1 / Total copies: 1
unAPI

Shades of mercy / by Borgos, Bruce,author.;
"In the usually quiet high desert of Nevada, Sheriff Porter Beck faces one of his greatest challenges-a series of unlikely, disturbing and increasingly deadly events of unknown origins. Porter Beck is the sheriff in the high desert of Nevada, doing the same lawman's job his father once did now that he's returned home after decades away. With his twelve person department, they cover a large area that is usually very quiet, but not of late. One childhood friend is the latest to succumb to a new wave of particularly strong illegal opioids, another childhood friend-now an enormously successful rancher-is targeted by a military drone, hacked and commandeered by an unknown source. The hacker is apparently local-local enough to call out Beck by name-and that means they are Beck's problem. Beck's investigation leads him to Mercy Vaughn, the one known hacker in the area. The problem is that she's a teenager, locked up with no computer access at the secure juvenile detention center. But there's something Mercy that doesn't sit quite right with Beck. But when Mercy disappears, Beck understands that she's in danger and time is running out for all of them"--
Subjects: Detective and mystery fiction.; Novels.; Criminal investigation; Drone aircraft; Hackers; Hacking; Missing persons; Murder; Opioids; Sheriffs;
Available copies: 1 / Total copies: 1
unAPI

Six degrees of freedom / by Dickner, Nicolas,1972-author.; Lederhendler, Lazer,1950-translator.; translation of:Dickner, Nicolas,1972-Six degrés de liberté.English.;
"A novel featuring obsession and adventure, science experiments and parakeets, coding and container ships, Six Degrees of Freedom was the winner of the Governor General's Literary Award in its original French-language version. Nicolas Dickner is a previous winner of Canada Reads for the novel Nikolski. Three characters, three separate paths to freedom. Lisa is a young woman with an eccentric and absent mother and a father slowly succumbing to Alzheimer's. Lisa's friend Éric is an agoraphobic hacker who ends up getting rich in Denmark before his eighteenth birthday. And Jay is a former computer pirate who's paying her debt to society, day by stultifiying day, working for the RCMP in Montreal. But when Jay learns of the existence of the mysterious ship container Papa Zulu she begins a clandestine investigation to discover who made it disappear and what they are trying to hide."--Winner of the 2015 French-language Governor General's Literary Award for Fiction
Subjects: Stowaways; Hackers; Voyages around the world; Ocean travel;
Available copies: 1 / Total copies: 1
unAPI