Results 1 to 10 of 15 | next »
- Countdown [videorecording] / by Dec, Justin,film director,screenwriter.; Facinelli, Peter,1973-actor.; Lail, Elizabeth,actor.; McDermott, Charlie,1990-actor.; Winters, Anne,1994-actor.; Elevation Pictures,publisher.;
Charlie McDermott, Anne Winters, Elizabeth Lail, Peter Facinelli.When a young nurse downloads an app that alleges to foresee a person's time of death, it claims she has three days to stay alive. With time running out, and an eerie figure haunting her, she must find a way to survive.Canadian Home Video Rating: 14A.MPAA rating: PG-13.DVD ; widescreen presentation ; Dolby Digital 5.1.
- Subjects: Horror films.; Feature films.; Video recordings for the hearing impaired.; Death; Mobile apps; Nurses;
- For private home use only.
- Available copies: 1 / Total copies: 1
-
unAPI
- Countdown [videorecording] / by Dec, Justin,film director,screenwriter.; Facinelli, Peter,1973-actor.; Lail, Elizabeth,actor.; McDermott, Charlie,1990-actor.; Winters, Anne,1994-actor.; Elevation Pictures,publisher.;
Charlie McDermott, Anne Winters, Elizabeth Lail, Peter Facinelli.When a young nurse downloads an app that alleges to foresee a person's time of death, it claims she has three days to stay alive. With time running out, and an eerie figure haunting her, she must find a way to survive.Canadian Home Video Rating: 14A.MPAA rating: PG-13.Blu-ray disc (requires Blu-ray player for playback) ; anamorphic widescreen format (2.39:1 aspect ratio) ; DTS-HD Master Audio 5.1, DTS-HD Digital surround 5.1, 2.0 DVS.
- Subjects: Horror films.; Feature films.; Video recordings for the hearing impaired.; Death; Mobile apps; Nurses;
- For private home use only.
- Available copies: 1 / Total copies: 1
-
unAPI
- Mini hacks for Pokémon Go players : secret tips for mastering the game / by Ryan, Justin(Video game author);
LSC
- Subjects: Pokémon go (Game); Pokémon (Fictitious characters); Video games.; Mobile games.; Mobile apps.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Mini hacks for Pokémon Go players : combat : skills, tips, and techniques for capture and battle / by Ryan, Justin(Video game author);
LSC
- Subjects: Pokémon go (Game); Pokémon (Fictitious characters); Video games.; Mobile games.; Mobile apps.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Sticky, sexy, sad : swipe culture and the darker side of dating apps / by Orchard, Treena,author.;
Includes bibliographical references and index."Lifelong luddite Treena Orchard was a newly sober woman coming off a much-needed break from relationships, reluctantly taking the digital plunge by downloading a dating app. Instead of the fun, easy experiences advertised on swiping platforms, she discovered endless upkeep, ghosting, fleeting moments of sexual connection, and a steady flow of misogyny. In Sticky, Sexy, Sad, Orchard uses her skills as both an anthropologist who studies sexuality and a sex-positive feminist to explore what it feels like to want love while also resisting the addictive pull of platforms designed to make us swipe-dependent. She asks important questions for those searching for love in the modern era: What are the social and human impacts of using dating apps? How can we maintain our integrity and warm-blooded desire for intimacy while swiping? Can we resist some of the problematic aspects of swipe culture? Is love on dating apps even possible? Revealing how dating apps are powerful social and sexual technologies that are radically transforming sexuality, relationships, and how we think about ourselves, this remarkable book cracks the code of modern romance. Told with humor and vulnerability, Sticky, Sexy, Sad is a riveting and inspiring guide to staying true to ourselves amid the digitization of love in the twenty-first century"--
- Subjects: Intimacy (Psychology); Love.; Online dating.; Sex.; Mobile apps;
- Available copies: 1 / Total copies: 1
-
unAPI
- Five-star stranger : a novel / by Tang, Kat,author.;
"Would you hire someone to be the best man at your wedding? Your stand-in brother? Your husband? In Kat Tang's exciting and resonant debut, a "Rental Stranger"-a companion hired under various guises-walks the line between personal and professional in surprising new ways. In an age where online ratings are all-powerful, Five-Star Stranger follows the adventures of a top-rated man on the "Rental Stranger" app-a place where users can hire a a pretend fiancé, a wingman, or an extra mourner for a funeral. Referred to only as Stranger, the narrator navigates New York City under the guise of characters he plays, always maintaining a professional distance from his clients. When a nosy patron threatens to upend his long-term role as father to a young girl, Stranger begins to reckon with his attachment to his pretend daughter, her mother, and his own fraught past. Now, he must confront the boundaries he has drawn and explore the legacy of abandonment that shaped his life. Five-Star Stranger is a strikingly vivid novel about the commodification of relationships in a gig economy, isolation in a hyperconnected world, and the risk of asking for what we want from those who cannot give. This is the story of a man who finds out who he is by being anyone but himself"--
- Subjects: Psychological fiction.; Novels.; Gig economy; Interpersonal relations; Mobile apps;
- Available copies: 1 / Total copies: 1
-
unAPI
- Behind a closed door / by Barker, J. D.(Jonathan Dylan),1971-author.;
"Would you kill a total stranger to save someone you love? Sugar & Spice is the latest app craze taking the world by storm, but for Abby and Brendan Hollander, downloading it leads to a dangerous game of life and death. When the app assigns them a series of increasingly taboo tasks, they soon find themselves caught up in a twisted web of seduction and violence in this sexually charged dark thriller from the New York Times bestselling author of The Fourth Monkey -- master of suspense, J.D. Barker."--
- Subjects: Thrillers (Fiction); Psychological fiction.; Novels.; Man-woman relationships; Married people; Mobile apps; Seduction; Violence;
- Available copies: 1 / Total copies: 1
-
unAPI
- The wife app / by Mackler, Carolyn,author.;
Three women create the Wife App to monetize the things wives do for free. Soon, it's the biggest start-up in New York City. But then life intervenes. And the consequences are larger than anything they expected.
- Subjects: Humorous fiction.; Domestic fiction.; Novels.; Divorced women; Female friendship; Mobile apps; New business enterprises; Unpaid labor;
- Available copies: 0 / Total copies: 1
-
unAPI
- Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy / by Richard, Laurent(Journalist),author.; Maddow, Rachel,writer of introduction.; Rigaud, Sandrine,author.;
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. "If they've found a way to hack one iPhone," says Edward Snowden, "they've found a way to hack all iPhones." Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech"--
- Subjects: Pegasus (Spyware); Cell phone systems; Electronic surveillance; Mobile apps.; Political corruption.; Privacy, Right of.; Spyware (Computer software);
- Available copies: 1 / Total copies: 1
-
unAPI
- Hacking / by Beaver, Kevin,author.;
Includes bibliographical references and index.pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes.Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.
- Subjects: Computer security.; Computer networks; Hackers.;
- Available copies: 1 / Total copies: 1
-
unAPI
Results 1 to 10 of 15 | next »