Results 11 to 20 of 59 | « previous | next »
- Five nights at Freddy's. [electronic resource]. by Sony Computer Entertainment.;
- Game.Five Nights at Freddy's: Security Breach is the latest installment of the family-friendly horror games loved by millions of players from all over the globe. Play as Gregory, a young boy trapped overnight in Freddy Fazbear's Mega Pizzaplex. With the help of Freddy Fazbear himself, Gregory must survive the near-unstoppable hunt of reimagined Five Nights at Freddy's characters - as well as new, horrific threats.ESRB Content Rating: T, Teen (Fantasy violence).Blu-ray disc compatible with Playstation 4 console ; HDTV 720p/1080i/1080p ; in game surround sound ; 30 GB storage required ; PS4 Pro enhanced.
- Subjects: Sony video games.; Survival horror video games.; Role playing video games.; Video games.; Playstation 4 (Video game console); Video games.; Computer games.; Escapes; Five nights at Freddy's Security breach (Game); Computer adventure games;
- Available copies: 0 / Total copies: 1
-
unAPI
- The sentinel / by Child, Lee,author.; Child, Andrew,author.;
- "It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury--and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher"--
- Subjects: Thrillers (Fiction); Reacher, Jack (Fictitious character); Retired military personnel; Cyberterrorism; Computer security; Murder;
- Available copies: 4 / Total copies: 4
-
unAPI
- The sentinel [sound recording] / by Child, Lee,author.; Brick, Scott,narrator.; Child, Andrew,author.; Random House Audio Publishing,publisher.;
- Read by Scott Brick."It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury--and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher"--
- Subjects: Thrillers (Fiction); Audiobooks.; Reacher, Jack (Fictitious character); Computer security; Cyberterrorism; Murder; Retired military personnel;
- Available copies: 1 / Total copies: 1
-
unAPI
- Five nights at Freddy's. [electronic resource]. by Nintendo of America Inc.;
- Game.Five Nights at Freddy's: Security Breach is the latest installment of the family-friendly horror games loved by millions of players from all over the globe. Play as Gregory, a young boy trapped overnight in Freddy Fazbear's Mega Pizzaplex. With the help of Freddy Fazbear himself, Gregory must survive the near-unstoppable hunt of reimagined Five Nights at Freddy's characters - as well as new, horrific threats.ESRB Content Rating: T, Teen (Fantasy violence).Cartridge compatible with Nintendo Switch video game system ; HDTV 720p/1080i/1080p ; in game surround sound ; Nintendo Switch Pro controller compatible.
- Subjects: Nintendo video games.; Role playing video games.; Survival horror video games.; Video games.; Nintendo Switch (Video game console); Nintendo Switch video games.; Video games.; Computer games.; Computer adventure games; Escapes; Five nights at Freddy's Security breach (Game);
- Available copies: 0 / Total copies: 1
-
unAPI
- This is how they tell me the world ends : the cyber-weapons arms race / by Perlroth, Nicole,author.;
- Includes bibliographical references and index."From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market--the most secretive, invisible, government-backed market on earth--and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--
- Subjects: Cyberterrorism.; Cyberterrorism; Cyberspace operations (Military science); Data protection; Intellectual property infringement.; Computer crimes.; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Click here to kill everybody : security and survival in a hyper-connected world / by Schneier, Bruce,1963-author.;
- Includes bibliographical references and index."The Internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the Internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--
- Subjects: Computer crimes.; Internet; Internet; Internet;
- Available copies: 1 / Total copies: 1
-
unAPI
- Online investing for dummies / by Krantz, Matt,author.;
- A hands-on, practical guide that shows you how to find an online broker, pick a winning strategy, and construct a successful portfolio.
- Subjects: Investments; Electronic trading of securities.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Protect your data and identity online / by Carser, A. R.;
- Includes bibliographical references and index.An unexpected whisper -- Who has your data? -- The history of protecting personal data -- Warning signs -- Protecting personal data."Protect Yourself Online examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly"--Provided by publisher.Grades 7-9.LSC
- Subjects: Computer crimes; Internet; Privacy; Data protection;
- Available copies: 1 / Total copies: 1
-
unAPI
- Blockchain revolution : how the technology behind Bitcoin is changing money, business, and the world / by Tapscott, Don,author.; Tapscott, Alex,author.;
- Includes bibliographical references and index."The first book to explain why blockchain technology will fundamentally change the Internet, what it does, and how we use it. Over the past 30 years, no theorist of the digital age has better explained the next big thing than Don Tapscott. For example, in Wikinomics, Tapscott was the first to show how the Internet provides the first global platform for mass collaboration. Now, he writes about a profound technological shift that will change how the world does business--and everything else--using blockchain technology, which powers the digital currency Bitcoin. The Internet as we know it is great for collaboration and communication, but is deeply flawed when it comes to commerce and privacy. The new blockchain technology facilitates peer-to-peer transactions without any intermediary such as a bank or governing body. Keeping the user's information anonymous, the blockchain validates and keeps a permanent public record of all transactions. That means that your personal information is private and secure, while all activity is transparent and incorruptible--reconciled by mass collaboration and stored in code on a digital ledger. With its advent, we will not need to trust each other in the traditional sense, because trust is built into the system itself. Although many opportunities for the blockchain require a digital currency, Bitcoin is only one application of this great innovation in computer science. The blockchain can hold any legal document, from deeds and marriage licences to educational degrees and birth certificates. Call it the World Wide Ledger. It enables smart contracts, decentralized autonomous organizations, decentralized government services, and transactions among things. The Internet of Everything needs a Ledger of Everything: the blockchain is a truly open, distributed, global platform that fundamentally changes what we can do online, how we do it, and who can participate. Tapscott, writing with his son Alex, a financial analyst and technologist, argues that the blockchain will shape the next era of prosperity--in finance, business, healthcare, education, governance, and beyond."--Provided by publisher.
- Subjects: Data encryption (Computer science); Electronic commerce.; Electronic funds transfers;
- Available copies: 1 / Total copies: 1
-
unAPI
- Gray day : my undercover mission to expose America's first cyber spy / by O'Neill, Eric,author.;
- "A cybersecurity expert and former FBI "ghost" tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets. With zero training in face-to-face investigation, Eric found himself in a windowless, high-security office in the newly formed Information Assurance Section, tasked officially with helping the FBI secure its outdated computer system against hackers and spies--and unofficially with collecting evidence against his new boss, Robert Hanssen, an exacting and rage-prone veteran agent with a disturbing fondness for handguns. In the months that follow, Eric's self-esteem and young marriage unravel under the pressure of life in Room 9930, and he questions the very purpose of his mission. But as Hanssen outmaneuvers an intelligence community struggling to keep up with the new reality of cybersecurity, he also teaches Eric the game of spycraft. Eric will just have to learn to outplay his teacher if he wants to win. A tension-packed stew of power, paranoia, and psychological manipulation, Gray Day is also a cautionary tale of how the United States allowed Russia to become dominant in cyberespionage--and how we might begin to catch up"--
- Subjects: Autobiographies.; Biographies.; Hanssen, Robert.; O'Neill, Eric.; United States. Federal Bureau of Investigation.; Cyber intelligence (Computer security); Spies; Spies; Intelligence service;
- Available copies: 1 / Total copies: 1
-
unAPI
Results 11 to 20 of 59 | « previous | next »