Results 51 to 59 of 59 | « previous
- Wired / by Garwood, Julie,author.;
- "A beautiful computer hacker and a bad-boy FBI agent must collaborate -- in more ways than one -- in the sizzling new novel from #1 New York Times bestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing -- and hacking -- code. Her dream is to write a new security program that could revolutionize the tech industry. Hotshot FBI agent Liam Scott has a problem: a leak deep within his own department. He needs the skills of a top-notch hacker to work on a highly sensitive project: to secretly break into the FBI servers and find out who the traitor is. But he can't use one of his own. He finds the perfect candidate in Allison. Only, there's one problem -- she wants nothing to do with his job and turns him down flat. What Liam doesn't know is that Allison is hiding secrets that she doesn't want the FBI to uncover. But Liam will do nearly anything to persuade her to join his team, even break a few rules if that's what it takes. A temptation that could put his job -- and both of their futures -- on the line"--
- Subjects: Thrillers (Fiction); Romance fiction.; United States. Federal Bureau of Investigation; Computer crimes;
- Available copies: 1 / Total copies: 1
-
unAPI
- Home automation with Raspberry Pi : projects using Google Home, Amazon Echo, and other intelligent personal assistants / by Norris, Donald(Electrical engineer),author.;
- Gain the skills needed to create a hi-tech home--affordably and easily This hands-on guide shows, step by step, how to use the powerful Raspberry Pi for home automation. Written in an easy-to-follow style, the book features DIY projects for Amazon Echo, Google Home, smart lightbulbs and thermostats, and more. Home Automation with Raspberry Pi: Projects Using Google Home, Amazon Echo, and Other Intelligent Personal Assistants lays out essential skills for hobbyists and makers of all ages and experience levels. You will discover how to build gadgets that can work in conjunction with--or in some cases replace--commercially available smart home products. Inside, you'll learn how to: Design and build custom home automation devices Interface a Google Home device to your Raspberry Pi Connect Google Voice Assistant to RasPi Incorporate GPIO control using the Amazon Echo Navigate home automation operating systems Use Z-Wave in your RasPi HA projects Apply fuzzy logic techniques to your projects Work with sensors and develop home security systems Utilize two open-source AI applications, Mycroft and Picroft Tie your projects together to create an integrated home automation system.
- Subjects: Raspberry Pi (Computer); Home automation.;
- Available copies: 1 / Total copies: 1
-
unAPI
- All systems red / by Wells, Martha,author.;
- In a corporate-dominated spacefaring future, planetary missions must be approved and supplied by the Company. Exploratory teams are accompanied by Company-supplied security androids, for their own safety. But in a society where contracts are awarded to the lowest bidder, safety isn't a primary concern. On a distant planet, a team of scientists are conducting surface tests, shadowed by their Company-supplied 'droid -- a self-aware SecUnit that has hacked its own governor module, and refers to itself (though never out loud) as "Murderbot." Scornful of humans, all it really wants is to be left alone long enough to figure out who it is. But when a neighboring mission goes dark, it's up to the scientists and their Murderbot to get to the truth.
- Subjects: Science fiction.; Artificial intelligence; Life on other planets; Interplanetary voyages; Androids; Robots; Human-computer interaction;
- Available copies: 1 / Total copies: 2
-
unAPI
- Man overboard : an Ali Reynolds novel / by Jance, Judith A,author.;
- "In New York Times bestselling author J.A. Jance's gripping new thriller, Man Overboard, two tech geniuses face off--one intent on saving lives, the other on ending them. Cybersecurity expert Roger McGeary finally has his life back on track after years of struggling with depression. But when he falls from the balcony of his suite on an all-expenses-paid cruise, the police quickly dismiss it as "death by misadventure," a vague phrase leaving much to interpretation. Unsatisfied, Roger's tough-as-nails aunt, Julia Miller, is determined to find answers and closure. By contacting Roger's childhood friend Stuart Ramey to help her solve the mystery of his fate, Julia unwittingly sets up a collision course with a serial killer. Stuart, his sidekick Cami Lee, and journalist turned amateur sleuth Ali Reynolds put the full resources of cutting edge online security firm High Noon Enterprises into learning the truth about Roger's death. With Cami on the high seas investigating the ship from which Roger disappeared, Stuart stays tied to his computer, locked in a battle of wits and technology against an unusually twisted adversary. Aided by Frigg, an artificial intelligence companion of his own creation, the killer targets victims who have lost parents to suicide and attempts to drive them to the same tragic end. When the heartless killer and his cyber accomplice set their sights on Stuart, High Noon must race against time to save him and countless others"--
- Subjects: Detective and mystery fiction.; Murder; Reynolds, Ali (Fictitious character); Women private investigators;
- Available copies: 2 / Total copies: 4
-
unAPI
- Cyber-threats to Canadian democracy / by Garnett, Holly Ann,editor.; Pal, Michael,editor.;
- Includes bibliographical references and index."From the Cambridge Analytica scandal to overloaded Internet voting servers to faulty voting machines, the growing relationship between democracy and technology has brought to light the challenges associated with integrating new digital tools into the electoral system. Canadian politics has also felt the impact of this migration online. This timely book presents the first comprehensive study of the various cyber threats to election integrity across Canadian jurisdictions. Scrutinizing the events of the 2019 federal election, Cyber Threats to Canadian Democracy examines how new technologies have affected the practice of electoral politics and what we can do to strengthen future Canadian elections. Through the disciplines of political science, law, computer science, engineering, communications, and others, chapters shed light on some of the most contentious issues around technology and electoral integrity. The contributors address current domestic and foreign threats to Canadian elections, evaluate the behaviour of actors ranging from political parties and interest groups to policymakers and election administrators, and assess emerging legal and regulatory responses while anticipating future challenges to the quality of elections in Canada and around the globe. Cyber Threats to Canadian Democracy helps seed the study of digital technology's security risks, providing insight into what reforms are needed and evaluating existing legal and policy frameworks in light of these threats."--
- Subjects: Democracy; Disinformation; Elections; Information technology; Threats;
- Available copies: 1 / Total copies: 1
-
unAPI
- Apprentice in death / by Robb, J. D.,1950-author.;
- "Lieutenant Eve Dallas returns in a fast-paced new novel from #1 New York Times bestselling author J. D. Robb. Nature versus nurture ... The shots came quickly, silently, and with deadly accuracy. Within seconds, three people were dead at Central Park's ice skating rink. The victims: a talented young skater, a doctor, and a teacher. As random as random can be. Eve Dallas has seen a lot of killers during her time with the NYPSD, but never one like this. After reviewing security videos, it becomes clear that the victims were killed by a sniper firing a tactical laser rifle, who could have been miles away when the trigger was pulled. And though the locations where the shooter could have set up seem endless, the list of people with that particular skill set is finite: police, military, professional killer. Eve's husband, Roarke, has unlimited resources--and genius--at his disposal. And when his computer program leads Eve to the location of the sniper, she learns a shocking fact: There were two--one older, one younger. Someone is being trained by an expert in the science of killing, and they have an agenda. Central Park was just a warm-up. And as another sniper attack shakes the city to its core, Eve realizes that though we're all shaped by the people around us, there are those who are just born evil."--
- Subjects: Detective and mystery fiction.; Dallas, Eve (Fictitious character); Policewomen; Murder;
- Available copies: 1 / Total copies: 3
-
unAPI
- The sisterhood : the secret history of women at the CIA / by Mundy, Liza,1960-author.;
- Includes bibliographical references and index."The New York Times bestselling author of Code Girls reveals the untold story of how women at the CIA ushered in the modern intelligence age, a sweeping story of a "sisterhood" of women spies spanning three generations who broke the glass ceiling, helped transform spycraft, and tracked down Osama Bin Laden. Upon its creation in 1947, the Central Intelligence Agency instantly became one of the most important spy services in the world. Like every male-dominated workplace in Eisenhower America, the growing intelligence agency needed women to type memos, send messages, manipulate expense accounts, and keep secrets. Despite discrimination--even because of it--these clerks and secretaries rose to become some of the shrewdest, toughest operatives the agency employed. Because women were seen as unimportant, they moved unnoticed on the streets of Bonn, Geneva, and Moscow, stealing secrets under the noses of the KGB. Back at headquarters, they built the CIA's critical archives--first by hand, then by computer. These women also battled institutional stereotyping and beat it. Men argued they alone could run spy rings. But the women proved they could be spymasters, too. During the Cold War, women made critical contributions to U.S. intelligence, sometimes as officers, sometimes as unpaid spouses, working together as their numbers grew. The women also made unique sacrifices, giving up marriage, children, even their own lives. They noticed things that the men at the top didn't see. In the final years of the twentieth century, it was a close-knit network of female CIA analysts who warned about the rising threat of Al Qaeda. After the 9/11 attacks, women rushed to join the fight as a new job, "targeter," came to prominence. They showed that painstaking data analysis would be crucial to the post-9/11 national security landscape--an effort that culminated spectacularly in the CIA's successful efforts to track down Osama Bin Laden and, later, Ayman al-Zawahiri. With the same meticulous reporting and storytelling verve that she brought to her New York Times bestseller Code Girls, Liza Mundy has written an indispensable and sweeping history that reveals how women at the CIA ushered in the modern intelligence age"--
- Subjects: Biographies.; Personal narratives.; United States. Central Intelligence Agency; Espionage, American; Intelligence service; Women intelligence officers; Women spies;
- Available copies: 1 / Total copies: 1
-
unAPI
- Never saw me coming : how I outsmarted the FBI and the entire banking system - and pocketed $40 million / by Smith, Tanya,author.;
- A riveting true story of an unsuspecting woman who creates an ingeniously clever white-collar scheme that manipulates the Federal banking system out of millions -- who eventually loses everything that is most important to her. In Never Saw Me Coming, Tanya Smith shares her deeply personal and remarkable story of how she went from a precocious young girl to a money-grabbing, computer-savvy wiz. It starts out as a keen interest in technology and innocently acquiring phone numbers to Michael Jackson, as well as other celebrities, and moves to her successfully stealing and depositing $5,000 into her grandmother's banking account. By the time she is 18, the risk taker has confiscated millions in cash. The FBI is hot on her tail and hauls her in for an interview, demanding Smith let them know who she's working for, "as these are not the kind of crimes Black people are smart enough to commit." Their words, indicating that intelligence was determined by race, severely offended Smith. Up for the challenge, she proves the FBI wrong and over time steals $40 million dollars, while securing diamonds, gold bars, and other commodities. Her lifestyle attracts the wrong kind of people, even those who set out to kill her. Law enforcement persisted, ultimately dubbing Smith "one of the single biggest threats to the entire United States banking system." She receives an outrageous prison sentence -- the longest for a white-collar offense -- and is eventually released by mounting her own brilliant defense. Complete with unexpected twists and turns, Never Saw Me Coming is a gripping caper that reminds never to underestimate a woman.
- Subjects: Biographies.; Case studies.; True crime stories.; Personal narratives.; Smith, Tanya.; African American criminals; Commercial crimes; Corporations; Female offenders; Fraud; Swindlers and swindling;
- Available copies: 1 / Total copies: 1
-
unAPI
- The coming wave : technology, power, and the twenty-first century's greatest dilemma / by Suleyman, Mustafa,author.; Bhaskar, Michael,author.;
- Includes bibliographical references and index."A stark and urgent warning on the unprecedented risks that a wave of fast-developing technologies poses to global order, and how we might contain them while we have the chance--from a cofounder of the pioneering AI company DeepMind. Imagine a world in which anyone with a $20,000 desktop DNA synthesizer could develop and unleash a deadly virus. Imagine an undetectable deepfake video of a U.S. president making a racial slur racing across the internet on the eve of an election. Imagine terrorists or paramilitaries stockpiling autonomous weapons designed to make their own decisions about when to engage. As cofounder of DeepMind, the pioneering AI company now owned by Google, Mustafa Suleyman has witnessed firsthand just how rapidly our technology is advancing--and how flawed our approaches to grappling with these changes are. The coming decades, he argues, will be defined by a burst of innovation, an inevitable wave of powerful, fast-proliferating new technologies across fields like synthetic biology, artificial intelligence, and quantum computing. Driven forward by immense strategic and financial incentives, these breakthroughs will solve huge challenges and create vast wealth--but upheaval, too, on a once unimaginable scale. Will humankind make it through the narrow corridor between dystopia and catastrophe? In The Coming Wave, Suleyman shows how this new technological super-wave fits a historical pattern of innovation and proliferation, while departing from it in key ways: namely, the speed of change, the breadth of risks, and the wave's potential to democratize access to dangerous, world-altering power. The cumulative risks threaten the very nation state, humanity's centuries' old "grand bargain" of living under centralized authority in exchange for security. As our fragile governments sleepwalk into catastrophe, humanity is left in an existential bind, with techno-authoritarianism on one side and even more catastrophic outcomes, like societal collapse, on the other. We are about to cross a critical threshold in the history of our species. In this groundbreaking book from the ultimate AI insider, Suleyman firmly establishes "the containment problem"--or the challenge of maintaining human control over dangerous technologies--as the essential dilemma of our age, showing that radical steps must be taken if we are to live alongside technology of once unimaginable power"--
- Subjects: Artificial intelligence; Information technology;
- Available copies: 0 / Total copies: 1
-
unAPI
Results 51 to 59 of 59 | « previous