Search:

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / by Shapiro, Scott J.,author.;
Includes bibliographical references (pages 331-402) and index."A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
Subjects: Case studies.; Hacking.; Hacking; Internet in espionage.; Internet; Phishing.; Phishing;
Available copies: 1 / Total copies: 1
unAPI

Missing persons / by Patterson, James,1947-author.; Hamdy, Adam,1974-author.; container of (work):Patterson, James,1947-Private rogue.;
A wealthy businessman approaches Jack Morgan, head of Private--the world's largest investigation agency--with a desperate plea to track down his daughter and grandchildren, who have disappeared without a trace. What at first seems to be a simple missing persons case soon escalates into something much more deadly, when Jack discovers the daughter is being pursued by highly trained operatives. As Jack uncovers more of the woman's backstory, the trail leads towards Afghanistan--where Jack's career as a US Marine ended in catastrophe ... Jack will need to face the trauma of his past to save a family's future.
Subjects: Thrillers (Fiction); Novels.; Morgan, Jack (Fictitious character); Military missions; Missing persons; Private investigators; Private security services;
Available copies: 3 / Total copies: 5
unAPI

Missing persons [text (large print)] / by Patterson, James,1947-author.; Hamdy, Adam,1974-author.; container of (work):Patterson, James,1947-Private rogue.;
A wealthy businessman approaches Jack Morgan, head of Private--the world's largest investigation agency--with a desperate plea to track down his daughter and grandchildren, who have disappeared without a trace. What at first seems to be a simple missing persons case soon escalates into something much more deadly, when Jack discovers the daughter is being pursued by highly trained operatives. As Jack uncovers more of the woman's backstory, the trail leads towards Afghanistan--where Jack's career as a US Marine ended in catastrophe ... Jack will need to face the trauma of his past to save a family's future.
Subjects: Thrillers (Fiction); Large print books.; Novels.; Morgan, Jack (Fictitious character); Military missions; Missing persons; Private investigators; Private security services;
Available copies: 1 / Total copies: 1
unAPI

Code warriors : NSA's codebreakers and the secret intelligence war against the Soviet Union / by Budiansky, Stephen.;
Includes bibliographical references and index.LSC
Subjects: United States. National Security Agency; Cryptography;
Available copies: 1 / Total copies: 1
unAPI

Whose water is it, anyway? : taking water protection into public hands / by Barlow, Maude,author.;
"The Blue Communities Project is dedicated to three primary things: that access to clean, drinkable water is a basic human right; that municipal and community water will be held in public hands; and that single-use plastic water bottles will not be available in public spaces. With its simple, straightforward approach, the movement has been growing around the world for a decade. Today, Paris, Berlin, Bern, and Victoria are just a few of the cities that have made themselves Blue Communities. In Whose Water Is It, Anyway?, renowned water justice activist Maude Barlow recounts her own education in water issues as she and her fellow grassroots water warriors woke up to the immense pressures facing water in a warming world. Concluding with a step-by-step guide to making your own community blue, Maude Barlow's latest book is a heartening example of how ordinary people can effect enormous change."--Provided by publisher.
Subjects: Blue Communities Project.; Right to water.; Water resources development.; Water resources development; Water-supply.; Water-supply; Water security.;
Available copies: 1 / Total copies: 1
unAPI

The sentinel / by Child, Lee,author.; Child, Andrew,author.;
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury--and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher"--
Subjects: Thrillers (Fiction); Reacher, Jack (Fictitious character); Retired military personnel; Cyberterrorism; Computer security; Murder;
Available copies: 3 / Total copies: 4
unAPI

The sentinel [sound recording] / by Child, Lee,author.; Brick, Scott,narrator.; Child, Andrew,author.; Random House Audio Publishing,publisher.;
Read by Scott Brick."It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury--and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher"--
Subjects: Thrillers (Fiction); Audiobooks.; Reacher, Jack (Fictitious character); Computer security; Cyberterrorism; Murder; Retired military personnel;
Available copies: 1 / Total copies: 1
unAPI

Blockchain revolution : how the technology behind Bitcoin is changing money, business, and the world / by Tapscott, Don,author.; Tapscott, Alex,author.;
Includes bibliographical references and index."The first book to explain why blockchain technology will fundamentally change the Internet, what it does, and how we use it. Over the past 30 years, no theorist of the digital age has better explained the next big thing than Don Tapscott. For example, in Wikinomics, Tapscott was the first to show how the Internet provides the first global platform for mass collaboration. Now, he writes about a profound technological shift that will change how the world does business--and everything else--using blockchain technology, which powers the digital currency Bitcoin. The Internet as we know it is great for collaboration and communication, but is deeply flawed when it comes to commerce and privacy. The new blockchain technology facilitates peer-to-peer transactions without any intermediary such as a bank or governing body. Keeping the user's information anonymous, the blockchain validates and keeps a permanent public record of all transactions. That means that your personal information is private and secure, while all activity is transparent and incorruptible--reconciled by mass collaboration and stored in code on a digital ledger. With its advent, we will not need to trust each other in the traditional sense, because trust is built into the system itself. Although many opportunities for the blockchain require a digital currency, Bitcoin is only one application of this great innovation in computer science. The blockchain can hold any legal document, from deeds and marriage licences to educational degrees and birth certificates. Call it the World Wide Ledger. It enables smart contracts, decentralized autonomous organizations, decentralized government services, and transactions among things. The Internet of Everything needs a Ledger of Everything: the blockchain is a truly open, distributed, global platform that fundamentally changes what we can do online, how we do it, and who can participate. Tapscott, writing with his son Alex, a financial analyst and technologist, argues that the blockchain will shape the next era of prosperity--in finance, business, healthcare, education, governance, and beyond."--Provided by publisher.
Subjects: Data encryption (Computer science); Electronic commerce.; Electronic funds transfers;
Available copies: 1 / Total copies: 1
unAPI

The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / by Mitnick, Kevin D.(Kevin David),1963-author.; Vamosi, Robert,author.;
Includes bibliographical references and index.
Subjects: Internet; Computer security.; Data protection.; Privacy, Right of.;
Available copies: 1 / Total copies: 1
unAPI

We solve murders / by Osman, Richard,1970-author.;
Steve Wheeler is enjoying retired life. He still does the odd bit of investigation work, but he prefers his familiar routines: the pub quiz, his favorite bench, his cat waiting for him at home. His days of adventure are over. Adrenaline is daughter-in-law Amy's job now. Amy Wheeler thinks adrenaline is good for the soul. Working in private security, every day is dangerous. She's currently on a remote island protecting mega-bestselling author Rosie D'Antonio, until a dead body and a bag of money mean trouble in paradise. So she sends an SOS to the only person she trusts ... As a thrilling race around the world begins, can Amy and Steve outrun and outsmart a killer?
Subjects: Detective and mystery fiction.; Cozy mysteries.; Novels.; Daughters-in-law; Fathers-in-law; Murder; Private security services;
Available copies: 0 / Total copies: 3
unAPI