Results 1 to 10 of 48 | next »
- Protect your data and identity online / by Carser, A. R.;
- Includes bibliographical references and index.An unexpected whisper -- Who has your data? -- The history of protecting personal data -- Warning signs -- Protecting personal data."Protect Yourself Online examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly"--Provided by publisher.Grades 7-9.LSC
- Subjects: Computer crimes; Internet; Privacy; Data protection;
- Available copies: 1 / Total copies: 1
-
unAPI
- The art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data / by Mitnick, Kevin D.(Kevin David),1963-author.; Vamosi, Robert,author.;
- Includes bibliographical references and index.
- Subjects: Internet; Computer security.; Data protection.; Privacy, Right of.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Respecting privacy / by Cavell-Clarke, Steffi.;
- Explains that respecting privacy is an important value which teaches young readers what should and should not remain private to keep everyone safe.Guided Reading: Q.LSC
- Subjects: Privacy; Data protection; Online identities;
- Available copies: 1 / Total copies: 1
-
unAPI
- Get the truth : former CIA officers teach you how to persuade anyone to tell all / by Houston, Philip,author.; Carnicero, Susan,author.; Floyd, Michael(CIA officer),author.; Romary, Peter,writer of added commentary.; Tennant, Don,writer.;
- "Getting someone to tell the truth is an essential skill that very few people possess. In the boardroom, classroom, or our own homes, every day we interact with others and try to get the truth from them. People are often untruthful out of fear of negative consequences associated with divulging information. But if a person is made to forget the long-term outcomes, he or she can be influenced to disclose sensitive information that's being withheld. The aim is to encourage the person to remain in short-term thinking mode, shifting focus away from the long-term ramifications of telling the truth. As former CIA agents and bestselling authors of Spy the Lie, Philip Houston, Mike Floyd, and Susan Carnicero are among the world's best at recognizing deceptive behavior and eliciting the truth from even the most accomplished liars. Get the Truth is a step-by-step guide that empowers readers to elicit the truth from others. It also chronicles the fascinating story of how the authors used a methodology Houston developed to elicit the truth in the counterterrorism and criminal investigation realms, and how these techniques can be applied to our daily lives. Using thrilling anecdotes from their careers in counterintelligence, and with easy-to-follow instructions, the authors provide a foolproof means of getting absolutely anybody to give an honest answer. Get the Truth is the easy and effective way to learn how to get the truth every time"--Provided by publisher.
- Subjects: Confidential communications.; Data protection.; Disclosure of information.; Persuasion (Psychology); Truthfulness and falsehood.;
- Available copies: 1 / Total copies: 1
-
unAPI
- We, the data : human rights in the digital age / by Wong, Wendy H.,1980-author.;
- Includes bibliographical references and index.Our data-intensive world is here to stay, but does that come at the cost of our humanity in terms of autonomy, community, dignity, and equality? In We, the Data, Wendy H. Wong argues that we cannot allow that to happen. Exploring the pervasiveness of data collection and tracking, Wong reminds us that we are all stakeholders in this digital world, who are currently being left out of the most pressing conversations around technology, ethics, and policy. This book clarifies the nature of datafication and calls for an extension of human rights to recognize how data complicate what it means to safeguard and encourage human potential. As we go about our lives, we are co-creating data through what we do. We must embrace that these data are a part of who we are, Wong explains, even as current policies do not yet reflect the extent to which human experiences have changed. This means we are more than mere "subjects" or "sources" of data "by-products" that can be harvested and used by technology companies and governments. By exploring data rights, facial recognition technology, our posthumous rights, and our need for a right to data literacy, Wong has crafted a compelling case for engaging as stakeholders to hold data collectors accountable. Just as the Universal Declaration of Human Rights laid the global groundwork for human rights, We, the Data gives us a foundation upon which we claim human rights in the age of data --
- Subjects: Data protection; Electronic information resources; Human rights;
- Available copies: 0 / Total copies: 1
-
unAPI
- This is how they tell me the world ends : the cyber-weapons arms race / by Perlroth, Nicole,author.;
- Includes bibliographical references and index."From The New York Times cybersecurity reporter Nicole Perlroth, the untold story of the cyberweapons market--the most secretive, invisible, government-backed market on earth--and a terrifying first look at a new kind of global warfare. Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--
- Subjects: Cyberterrorism.; Cyberterrorism; Cyberspace operations (Military science); Data protection; Intellectual property infringement.; Computer crimes.; Computer security.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Data cartels : the companies that control and monopolize our information / by Lamdan, Sarah,author.;
- Includes bibliographical references and index."In our digital world, data is power, and information hoarders reign supreme. The practices of these digital pillagers are analogous to those of cartels--they use intimidation, aggression, and force to maintain control and power. Sarah Lamdan brings us into the unregulated underworld of the "data cartels," demonstrating how the entities mining, hoarding, commodifying, and selling our data and informational resources perpetuate social inequalities and threaten the democratic sharing of knowledge. The companies at the center of this book are not household names like Google. They fly under the radar and self-identify as "data analytics" or "business solutions" operations. These companies supply the digital lifeblood that flow through the circulatory system of the internet. With their control over data, they can prevent the free flow of information to places where it is needed, and simultaneously distribute private information to predatory entities. Just a few companies dominate most of our critical informational resources, from scientific research and financial data to the law. They are also data brokers, selling our personal data to law enforcement and other government agencies that determine whether we should be eligible for social services, and they sell "risk" products that insurance companies, employers, landlords, and healthcare systems use to make decisions. Alarmingly, everything they're doing is perfectly legal. Ranging from small information firms to billion-dollar data giants like Thomson Reuters and RELX Group, these companies masterfully exploit outdated information and privacy laws, curating online information in a way that amplifies digital racism and targets marginalized communities. In this book, Lamdan contends that privatization and tech exceptionalism have prevented us from creating effective legal regulation. Lack of legal intervention has allowed oversized information oligopolies to coalesce. In addition to specific legal and market-based solutions, Lamdan calls for treating information like a public good and creating digital infrastructure that supports our democratic ideals"--
- Subjects: Antitrust law; Cartels; Data protection; Freedom of information; Information services industry; Information services industry;
- Available copies: 1 / Total copies: 1
-
unAPI
- Targeted : the Cambridge Analytica whistleblower's inside story of how big data, Trump, and Facebook broke democracy and how it can happen again / by Kaiser, Brittany,author.;
- Includes bibliographical references (pages [387]-392).In this explosive memoir, Kaiser reveals the disturbing truth about the multi-billion-dollar data industry, revealing how companies are getting richer using our personal information and exposing how Cambridge Analytica exploited weaknesses in privacy laws to help elect Donald Trump--and how this could easily happen again in the 2020 presidential election.tion.
- Subjects: Kaiser, Brittany.; Cambridge Analytica Ltd.; Facebook (Firm); Data protection; Internet in political campaigns; Political campaigns; Presidents;
- Available copies: 1 / Total copies: 1
-
unAPI
- How to use Evernote for genealogy : a step-by-step guide to organize your research and boost your genealogy productivity / by Scott, Kerry(Genealogy instructor);
- Includes Internet addresses and index.Getting acquainted with Evernote -- Getting started in Evernote -- Organizing in Evernote -- Finding data in Evernote -- Taking advantage of tags -- Using different types of data -- Sharing and collaborating -- Putting it all together -- Syncing and securing your Evernote data on mobile devices -- Enhancing Evernote with external tools -- Protecting your Evernote files -- Troubleshooting -- Appendix A, Evernote quick reference guide -- Appendix B, Census extraction templates -- Appendix C, Genealogy conference planner -- Appendix D, Research worksheets and templates.LSC
- Subjects: Evernote.; Genealogy; Genealogy; Note-taking; File organization (Computer science);
- Available copies: 1 / Total copies: 1
-
unAPI
- Fair warning / by Connelly, Michael,1956-author.;
- Veteran reporter Jack McEvoy has taken down killers before, but when a woman he had a one-night stand with is murdered in a particularly brutal way, McEvoy realizes he might be facing a criminal mind unlike any he's ever encountered. Jack investigates--against the warnings of the police and his own editor--and makes a shocking discovery that connects the crime to other mysterious deaths across the country. Undetected by law enforcement, a vicious killer has been hunting women, using genetic data to select and stalk his targets. Uncovering the murkiest corners of the dark web, Jack races to find and protect the last source who can lead him to his quarry. But the killer has already chosen his next target, and he's ready to strike.
- Subjects: Thrillers (Fiction); McEvoy, Jack (Fictitious character); Journalists; Genetics; Serial murders; Serial murder investigation;
- Available copies: 0 / Total copies: 2
-
unAPI
Results 1 to 10 of 48 | next »