Results 11 to 20 of 40 | « previous | next »
- The fabulous friend machine / by Bland, Nick,1973-;
- Popcorn, the friendliest chicken at Fiddlesticks Farm, finds a forgotten smartphone in the farm, and is soon spending all day and all night exchanging messages with exciting new friends, and ignoring her old friends, the farm animals. When she invites her new friends to meet her at the farm, they are not quite what she expects, but the farm animals step in to save her from disaster.LSC
- Subjects: Chickens; Smartphones; Smartphones; Domestic animals; Friendship;
- Available copies: 1 / Total copies: 1
-
unAPI
- The wires of war : technology and the global struggle for power / by Helberg, Jacob,author.;
- Includes bibliographical references and index.From Jacob Helberg, the former News Policy lead at Google, comes an urgent and groundbreaking account of the high-stakes global cyberwar brewing between Western democracies and the autocracies of China and Russia that could potentially crush democracy.
- Subjects: Computer networks; Computer security.; Cyber intelligence (Computer security); Cyberspace operations (Military science); Cyberspace; Internet and international relations.; Technological innovations.; Technology and international relations.; Technology;
- Available copies: 1 / Total copies: 1
-
unAPI
- The Director : a novel / by Ignatius, David,1950-;
-
- Subjects: Spy stories.; United States. Central Intelligence Agency; Computer crimes; Computer hackers; Computer networks;
- Available copies: 1 / Total copies: 1
-
unAPI
- Dark wire : the incredible true story of the largest sting operation ever / by Cox, Joseph(Journalist),author.;
- Includes bibliographical references."Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes -- the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld. They watched drug deals and hits being planned in real time, making arrests where they could without blowing their cover. For a period of years, some one hundred thousand criminals worldwide, including members of South American drug cartels, the Calabrian mafia, and the Chinese Triad, did their business in full view of the officers they were trying to evade. It was a sprawling global economy as efficient and interconnected as the legal one. But a surveillance operation like this couldn't last. It was too dangerous, too ethically fraught, too large. And it all ended in spectacular fashion. Dark Wire is more than the story of this enormous sting operation -- it shows the fundamental problems of policing in such a vast and high-speed economy. This is a caper for our modern world, where everyone is connected and no one is completely free"--
- Subjects: Electronic surveillance; Organized crime investigation.; Text messaging (Cell phone systems); Undercover operations;
- Available copies: 1 / Total copies: 1
-
unAPI
- 13 Hours [videorecording (BLURAY)] : the secret soldiers of Benghazi / by Dale, James Badge,1978-; Denman, David.; Fumusa, Dominic,1969-; Krasinski, John,1979-; Martini, Max,1969-; Schreiber, Pablo.; Paramount Pictures Corporation,publisher.;
- John Krasinski, James Badge Dale, Pablo Schreiber, David Denman, Dominic Fumusa, Max Martini.A gripping true story of six elite ex-military operators assigned to protect the CIA who fought back against overwhelming odds when terrorists attacked in the U.S. Diplomatic compound on September 11, 2012. When everything went wrong six men had the courage to do what was right.Canadian Home Video Rating: 14A.MPAA rating: R.Blu-ray disc (requires Blu-ray player for playback) ; anamorphic widescreen format; Dolby Atmos, Dolby digital discrete 5.1, 2.0.
- Subjects: Action and adventure films.; Video recordings for people with visual disabilities.; Video recordings for the hearing impaired.; Benghazi Consulate Attack, Banghāzī, Libya, 2012; Diplomatic and consular service, American; Private security services; Soldiers;
- For private home use only.
- Available copies: 1 / Total copies: 1
-
unAPI
- Smart homes in easy steps : master smart technology for your home. by Vandome, Nick,author.;
-
- Subjects: Intelligent personal assistants (Computer software); Wireless communication systems.; Home automation.; Home computer networks.; Household electronics.; Dwellings; Home entertainment systems.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Baseball cop : the dark side of America's national pastime / by Dominguez, Eddie,1957-author.; Red, Christian,author.; Thompson, Teri,author.;
- Includes bibliographical references and index.
- Subjects: Dominguez, Eddie, 1957-; Major League Baseball (Organization); Baseball; Police; Sports facilities; Sports;
- Available copies: 1 / Total copies: 1
-
unAPI
- After death / by Koontz, Dean R.(Dean Ray),1945-author.;
- "Michael Mace, head of security at a top-secret research facility, opens his eyes in a makeshift morgue twenty-four hours following an event in which everyone perished--including him and his best friend, Shelby Shrewsberry. Having awakened with an extraordinary ability unlike anything he--or anyone else--has ever imagined, Michael is capable of being as elusive as a ghost. He sets out to honor his late friend by helping Nina Dozier and her son, John, whom Shelby greatly admired. Although what Michael does for Nina is life changing, his actions also evoke the wrath of John's father, a member of one of the most violent street gangs in Los Angeles. But an even greater threat is descending: the Internal Security Agency's most vicious assassin, Durand Calaphas. Calaphas will stop at nothing to get his man. If Michael dies twice, he will not live a third time. From the tarnished glamour of Beverly Hills to the streets of South Central to a walled estate in Rancho Santa Fe, only Michael can protect Nina and John--and ensure that light survives in a rapidly darkening world"--
- Subjects: Thrillers (Fiction); Novels.; Ability; Assassins; Biological weapons; Death; Gangs; Good and evil; Laboratories; Threats;
- Available copies: 2 / Total copies: 2
-
unAPI
- After death [sound recording] / by Koontz, Dean R.(Dean Ray),1945-author.; Ballerini, Edoardo,1970-narrator.; Brilliance Audio (Firm),publisher.;
- Read by Edoardo Ballerini."Michael Mace, head of security at a top-secret research facility, opens his eyes in a makeshift morgue twenty-four hours following an event in which everyone perished--including him and his best friend, Shelby Shrewsberry. Having awakened with an extraordinary ability unlike anything he--or anyone else--has ever imagined, Michael is capable of being as elusive as a ghost. He sets out to honor his late friend by helping Nina Dozier and her son, John, whom Shelby greatly admired. Although what Michael does for Nina is life changing, his actions also evoke the wrath of John's father, a member of one of the most violent street gangs in Los Angeles. But an even greater threat is descending: the Internal Security Agency's most vicious assassin, Durand Calaphas. Calaphas will stop at nothing to get his man. If Michael dies twice, he will not live a third time. From the tarnished glamour of Beverly Hills to the streets of South Central to a walled estate in Rancho Santa Fe, only Michael can protect Nina and John--and ensure that light survives in a rapidly darkening world"--
- Subjects: Audiobooks.; Novels.; Thrillers (Fiction); Ability; Assassins; Biological weapons; Death; Gangs; Good and evil; Laboratories; Threats;
- Available copies: 1 / Total copies: 1
-
unAPI
- Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy / by Richard, Laurent(Journalist),author.; Maddow, Rachel,writer of introduction.; Rigaud, Sandrine,author.;
- "Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. "If they've found a way to hack one iPhone," says Edward Snowden, "they've found a way to hack all iPhones." Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech"--
- Subjects: Pegasus (Spyware); Cell phone systems; Electronic surveillance; Mobile apps.; Political corruption.; Privacy, Right of.; Spyware (Computer software);
- Available copies: 1 / Total copies: 1
-
unAPI
Results 11 to 20 of 40 | « previous | next »