Search:

Super social media and awesome online safety / by Gifford, Clive.;
Includes bibliographical references, Internet addresses and index."This important book explains how the code behind social media networks connects people around the world. Young readers will learn how networks are built using algorithms, how they communicate using messaging systems, and how privacy settings, IP addresses, and cookies work. The dangers of talking to strangers online are discussed, and readers are encouraged to think about how to participate on social networks safely and responsibly"--Provided by publisher.Guided reading: T.LSC
Subjects: Online social networks; Social media; Computer networks; Internet and children; Online social networks; Social media;
Available copies: 1 / Total copies: 1
unAPI

Dark angel / by Sandford, John,1944 February 23-author.;
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Subjects: Thrillers (Fiction); Novels.; United States. Department of Homeland Security; Betrayal; Computer crimes; Government investigators; Hackers; Undercover operations;
Available copies: 3 / Total copies: 5
unAPI

Dark angel [text (large print)] / by Sandford, John,1944 February 23-author.;
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Subjects: Thrillers (Fiction); Large print books.; Novels.; United States. Department of Homeland Security; Betrayal; Computer crimes; Government investigators; Hackers; Undercover operations;
Available copies: 1 / Total copies: 1
unAPI

Homeland / by Doctorow, Cory.;
When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.LSC
Subjects: Science fiction.; Suspense fiction.; United States. Dept. of Homeland Security; Politics, Practical; Computer hackers; Civil rights; Counterculture;
© 2013., Tom Doherty,
Available copies: 1 / Total copies: 1
unAPI

The switch : a novel / by Finder, Joseph,author.;
"A simple mix up throws one innocent man into the crosshairs of sinister government secrets and ruthless political ambitions in New York Times bestselling author Joseph Finder's timely, electrifying new thriller. Michael Tanner is on his way home from a business trip when he accidentally picks up the wrong MacBook in an airport security line. He doesn't notice the mix-up until he arrives home in Boston, but by then it's too late. Tanner's curiosity gets the better of him when he discovers that the owner is a US senator and that the laptop contains top secret files. When Senator Susan Robbins realizes she's come back with the wrong laptop, she calls her young chief of staff, Will Abbott, in a panic. Both know that the senator broke the law by uploading classified documents onto her personal computer. If those documents wind up in the wrong hands, it could be Snowden 2.0--and her career in politics will be over. She needs to recover the MacBook before it's too late. When Will fails to gain Tanner's cooperation, he is forced to take measures to retrieve the laptop before a bigger security breach is revealed. He turns to an unscrupulous "fixer" for help. In the meantime, the security agency whose files the senator has appropriated has its own methods, darker still--and suddenly Tanner finds himself a hunted man, on the run, terrified for the safety of his family, in desperate need of a plan, and able to trust no one"--
Subjects: Thrillers (Fiction); Political fiction.; Legislators; Laptop computers; Security classification (Government documents); Secrets;
Available copies: 1 / Total copies: 1
unAPI

The switch [sound recording] : a novel / by Finder, Joseph,author.; Kearney, Steven,narrator.; Penguin Audio (Firm),publisher.;
Read by Steven Kearney."A simple mix up throws one innocent man into the crosshairs of sinister government secrets and ruthless political ambitions in New York Times bestselling author Joseph Finder's timely, electrifying new thriller. Michael Tanner is on his way home from a business trip when he accidentally picks up the wrong MacBook in an airport security line. He doesn't notice the mix-up until he arrives home in Boston, but by then it's too late. Tanner's curiosity gets the better of him when he discovers that the owner is a US senator and that the laptop contains top secret files. When Senator Susan Robbins realizes she's come back with the wrong laptop, she calls her young chief of staff, Will Abbott, in a panic. Both know that the senator broke the law by uploading classified documents onto her personal computer. If those documents wind up in the wrong hands, it could be Snowden 2.0--and her career in politics will be over. She needs to recover the MacBook before it's too late. When Will fails to gain Tanner's cooperation, he is forced to take measures to retrieve the laptop before a bigger security breach is revealed. He turns to an unscrupulous "fixer" for help. In the meantime, the security agency whose files the senator has appropriated has its own methods, darker still--and suddenly Tanner finds himself a hunted man, on the run, terrified for the safety of his family, in desperate need of a plan, and able to trust no one"--
Subjects: Thrillers (Fiction); Audiobooks.; Political fiction.; Legislators; Laptop computers; Security classification (Government documents); Secrets;
Available copies: 1 / Total copies: 1
unAPI

Citizenfour [videorecording] / by Bonnefoy, Mathilde,film producer.; Greenwald, Glenn,interviewer.; Poitras, Laura,film director,film producer.; Snowden, Edward J.,1983-interviewee.; Wilutzky, Dirk,film producer.; Entertainment One (Firm : Canada),film distributor.; Praxis Films,production company.; RADiUS TWC (Firm),presenter.; Séville Pictures,publisher.;
Edited by Mathilde Bonnefoy ; filmed by Laura Poitras, Kristen Johnson, Katy Scoggin, Trevor Paglen.Edward Snowden, Glenn Greenwald.With unprecedented access, this gripping behind-the-scenes chronicle follows award winning director Laura Poitras and journalist Glenn Greenwald's remarkable encounters with whistle-blower Edward Snowden in a hotel room in Hong Kong, as he hands over classified documents that provide evidence of mass indiscriminate and illegal invasions of privacy by the NSA.Canadian Home Video Rating: PG.DVD ; widescreen (1.78:1) presentation ; Dolby Digital 5.1.Academy Awards, 2015 : Best documentary feature
Subjects: Snowden, Edward J., 1983-; United States. National Security Agency.; Computer crimes; Documentary films.; Domestic intelligence; Electronic surveillance; Espionage; Leaks (Disclosure of information); Political films.; Whistle blowing;
For private home use only.
Available copies: 0 / Total copies: 1
unAPI

@WAR : the rise of the military-Internet complex / by Harris, Shane.;
Includes bibliographical references and index.Prologue -- The first cyber war -- RTRG-- Building the cyber army -- The internet is a battlefield -- The enemy among us -- The mercenaries -- Cops become spies -- "Another Manhattan Project" -- Buckshot Yankee -- The secret sauce -- The corporate counterstrike -- Spring awakening -- The business of defense -- At the dawn.
Subjects: United States. National Security Agency.; United States. Strategic Command (2002- ). Cyber Command.; Computer crimes; Cyberspace; Cyberterrorism; Information warfare;
Available copies: 1 / Total copies: 1
unAPI

Dark angel [sound recording] / by Sandford, John,1944 February 23-author.; Petkoff, Robert,narrator.; Penguin Audio (Firm),publisher.;
Read by Robert Petkoff."Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Subjects: Audiobooks.; Novels.; Thrillers (Fiction); United States. Department of Homeland Security; Betrayal; Computer crimes; Government investigators; Hackers; Undercover operations;
Available copies: 1 / Total copies: 1
unAPI

Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy / by Richard, Laurent(Journalist),author.; Maddow, Rachel,writer of introduction.; Rigaud, Sandrine,author.;
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. "If they've found a way to hack one iPhone," says Edward Snowden, "they've found a way to hack all iPhones." Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech"--
Subjects: Pegasus (Spyware); Cell phone systems; Electronic surveillance; Mobile apps.; Political corruption.; Privacy, Right of.; Spyware (Computer software);
Available copies: 1 / Total copies: 1
unAPI