Search:

Kingdom of lies : unnerving adventures in the world of cybercrime / by Fazzini, Kate,author.;
Includes bibliographical references and index.In the tradition of Michael Lewis and Tom Wolfe, a fascinating and frightening behind-the-scenes look at the interconnected cultures of hackers, security specialists, and law enforcement. A 19-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions--without knowing the first thing about computers. A veteran cybersecurity specialist has built a deep network of top notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny New Jersey apartment to hack sports cars at a high performance shop in Newark. But he opens his door to a consultant who needs his help. A hotel doorman in China once served in the People's Army, stealing intellectual property from American companies. Now he uses his skills to build up a private side-business selling the data he takes from travelers to Shanghai's commercial center. Kingdom of Lies follows the intertwined stories of cybercriminals and ethical hackers as they jump from criminal trend to criminal trend, crisis to crisis. A cybersecurity professional turned journalist, Kate Fazzini illuminates the many lies companies and governments tell us about our security, the lies criminals tell to get ahead, and the lies security leaders tell to make us think they are better at their jobs than they are.
Subjects: True crime stories.; Computer crimes.; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

Tracers in the dark : the global hunt for the crime lords of cryptocurrency / by Greenberg, Andy,author.;
Includes bibliographical references and index."A propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, taking once-anonymous realms of money, drugs, and violence and holding them up to the light. Black markets have always thrived in the shadows of society. Increasingly, these enterprises--drug dealing, money laundering, human trafficking, terrorist funding--have found their shadows online. Digital crime lords inhabiting lawless corners of the internet have operated more freely than their analog counterparts could have ever dreamed of. At the heart of their massive conspiracies: cryptocurrency. By transacting not in dollars or pounds but in Bitcoin--a currency with anonymous ledgers, overseen by no government, beholden to no bankers--black marketeers robbed law enforcement for years of their chief method of cracking down on criminal markets, namely, following the money. But what if the centerpiece of this dark economy held a secret, fatal flaw? What if their currency wasn't so cryptic after all? An investigator using the right mixture of technical wizardry, financial forensics, and old-fashioned persistence could crack open an entire world of crime. With unprecedented access to the major players in federal law enforcement and private industry, veteran cybersecurity reporter Andy Greenberg tells an astonishing saga of criminal empires built and destroyed. He introduces an IRS agent with a defiant streak; a Bitcoin-tracing Danish entrepreneur; and a colorful ensemble of hardboiled agents and prosecutors as they delve deep into the crypto-underworld. The result is a thrilling, globe-spanning story of dirty cops, drug bazaars, sex-abuse rings, and the biggest takedown of an online narcotics market in the history of the internet. This is a cat-and-mouse story and a tale of a technological one-upmanship that's utterly of our time. Filled with canny maneuvering and shocking twists, it answers a provocative question: How would some of the world's most brazen criminals behave if they were sure they could never get caught?"--
Subjects: Commercial crimes.; Computer crimes.; Cryptocurrencies.; Transnational crime.;
Available copies: 1 / Total copies: 1
unAPI

Constant fear / by Palmer, Daniel,1962-;
Subjects: Suspense fiction.; Computer crimes; Hostages;
Available copies: 1 / Total copies: 1
unAPI

Future crimes : everything is connected, everyone is vulnerable and what we can do about it / by Goodman, Marc,author.;
Includes bibliographical references and index.
Subjects: Computer crimes.; Technology;
Available copies: 1 / Total copies: 2
unAPI

The ransomware hunting team : a band of misfits' improbable crusade to save the world from cybercrime / by Dudley, Renee,1985-author.; Golden, Daniel,1957-author.;
Includes bibliographical references and index."The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Subjects: Computer crimes; Computer security.; Malware (Computer software);
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime - and how to protect your business / by Sangster, Mark,author.;
Includes bibliographic references and index."Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure."--
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Digital data security / by Hudak, Heather C.,1975-;
Includes bibliographical references, Internet addresses, and index.LSC
Subjects: Computer crimes; Computer security;
Available copies: 1 / Total copies: 1
unAPI

Crash / by Hagberg, David,author.; Light, Lawrence,author.;
"With debt-burdened governments and businesses worldwide about to go bust, a cabal of Wall Street big shots plot to destroy the globe's stock exchanges. To provide that one thing that goes wrong. In 24 hours, a powerful computer worm will smash the exchanges and spark an international panic, pushing a debt-laden world into the abyss. The Wall Street gang's investment bank will be the last one standing, able to make a killing amid the ruins. But one person, who works for their bank as a computer expert, spots the worm embedded deep in its network. Cassy Levin invents a program to destroy the cyber-intruder. Angered by Cassy's discovery, her bosses order her kidnapping. Her boyfriend, a former Navy SEAL, is alarmed at Cassy's disappearance and unravels the plot. Ben Whalen only has until the next morning to save the woman he loves and prevent the economic apocalypse."--Amazon.ca.
Subjects: Thrillers (Fiction); Computer crimes; Commercial crimes; Kidnapping; Conspiracies; Financial crises;
Available copies: 1 / Total copies: 1
unAPI

Wildcard / by Lu, Marie,1984-;
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--Provided by publisher.LSC
Subjects: Adventure fiction.; Spy stories.; Internet games; Computer crimes; Hackers; Bounty hunters;
Available copies: 1 / Total copies: 1
unAPI

Warcross / by Lu, Marie,1984-;
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--Provided by publisher.LSC
Subjects: Adventure fiction.; Spy stories.; Hackers; Bounty hunters; Internet games; Computer crimes;
Available copies: 1 / Total copies: 1
unAPI