Search:

A woman alone / by Laurin, Nina,author.;
A year after a home invasion left her traumatized, Cecelia and her family move into a new house with a complex security system that is supposed to make her feel safe. But reality proves different as strange things begin to happen and the security system reveals that the house had a prior occupant: Lydia. On her quest to discover the fate of Lydia, Cecelia uncovers metaphorical skeletons in the closet, and she realizes that no one's secrets are safe - including her own. From the author of 'Girl Last Seen'.
Subjects: Thrillers (Fiction); Psychological fiction.; Artificial intelligence; Electronic security systems;
Available copies: 1 / Total copies: 1
unAPI

Snoop / by Korman, Gordon.;
Carter is stuck at home for weeks with both his legs in casts after a skiing accident. Bored, he starts checking out the live feeds from police cams around his town. Before he knows it, he's obsessed--watching his classmates when they don't know he's looking, and discovering some other very strange things going on that no one else is noticing. But what happens when Carter is found out.. and the people he's watching know where he lives?--Adapted from OCLC.
Subjects: Accidents; Security systems; Secrecy; Conduct of life;
Available copies: 0 / Total copies: 1
unAPI

Dark wire : the incredible true story of the largest sting operation ever / by Cox, Joseph(Journalist),author.;
Includes bibliographical references."Beginning in 2018, a powerful app for secure communications, called Anom, began to take root among drug dealers and other criminals. It had extraordinary safeguards to keep out prying eyes -- the power to quickly wipe data, voice-masking technology, and more. It was better than other apps popular among organized crime syndicates, except for one thing: it was secretly run by law enforcement. Over the next few years, the FBI, along with law enforcement partners in Australia and parts of Europe, got a front row seat to the global criminal underworld. They watched drug deals and hits being planned in real time, making arrests where they could without blowing their cover. For a period of years, some one hundred thousand criminals worldwide, including members of South American drug cartels, the Calabrian mafia, and the Chinese Triad, did their business in full view of the officers they were trying to evade. It was a sprawling global economy as efficient and interconnected as the legal one. But a surveillance operation like this couldn't last. It was too dangerous, too ethically fraught, too large. And it all ended in spectacular fashion. Dark Wire is more than the story of this enormous sting operation -- it shows the fundamental problems of policing in such a vast and high-speed economy. This is a caper for our modern world, where everyone is connected and no one is completely free"--
Subjects: Electronic surveillance; Organized crime investigation.; Text messaging (Cell phone systems); Undercover operations;
Available copies: 1 / Total copies: 1
unAPI

Pegasus : how a spy in your pocket threatens the end of privacy, dignity, and democracy / by Richard, Laurent(Journalist),author.; Maddow, Rachel,writer of introduction.; Rigaud, Sandrine,author.;
"Pegasus is widely regarded as the most effective and sought-after cyber-surveillance system on the market. The system's creator, the NSO Group, a private corporation headquartered in Israel, is not shy about proclaiming its ability to thwart terrorists and criminals. "Thousands of people in Europe owe their lives to hundreds of our company employees," NSO's cofounder declared in 2019. This bold assertion may be true, at least in part, but it's by no means the whole story. NSO's Pegasus system has not been limited to catching bad guys. It's also been used to spy on hundreds, and maybe thousands, of innocent people around the world: heads of state, diplomats, human rights defenders, political opponents, and journalists. This spyware is as insidious as it is invasive, capable of infecting a private cell phone without alerting the owner, and of doing its work in the background, in silence, virtually undetectable. Pegasus can track a person's daily movement in real time, gain control of the device's microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords-encrypted or not. This data can be exfiltrated, stored on outside servers, and then leveraged to blackmail, intimidate, and silence the victims. Its full reach is not yet known. "If they've found a way to hack one iPhone," says Edward Snowden, "they've found a way to hack all iPhones." Pegasus is a look inside the monthslong worldwide investigation, triggered by a single spectacular leak of data, and a look at how an international consortium of reporters and editors revealed that cyber intrusion and cyber surveillance are happening with exponentially increasing frequency across the globe, at a scale that astounds. Meticulously reported and masterfully written, Pegasus shines a light on the lives that have been turned upside down by this unprecedented threat and exposes the chilling new ways authoritarian regimes are eroding key pillars of democracy: privacy, freedom of the press, and freedom of speech"--
Subjects: Pegasus (Spyware); Cell phone systems; Electronic surveillance; Mobile apps.; Political corruption.; Privacy, Right of.; Spyware (Computer software);
Available copies: 1 / Total copies: 1
unAPI

We are eating the Earth : the race to fix our food system and save our climate / by Grunwald, Michael,1970-author.;
Includes bibliographical references and index.Humanity has cleared a land mass the size of Asia plus Europe to grow food, and our food system generates a third of our carbon emissions. By 2050, we're going to need a lot more calories to fill nearly 10 billion bellies, but we can't feed the world without frying it if we keep tearing down an acre of rainforest every six seconds. We are eating the earth, and the greatest challenge facing our species will be to slow our relentless expansion of farmland into nature. Even if we quit fossil fuels, we'll keep hurtling towards climate chaos if we don't solve our food and land problems. In this rollicking, shocking narrative, Grunwald shows how the world, after decades of ignoring the climate problem at the centre of our plates, has pivoted to making it worse, embracing solutions that sound sustainable but could make it even harder to grow more food with less land. But he also tells the stories of the dynamic scientists and entrepreneurs pursuing real solutions, from a jungle-tough miracle crop called pongamia to genetically-edited cattle embryos, from Impossible Whoppers to a non-polluting pesticide that uses the technology behind the COVID vaccines to constipate beetles to death. It's an often infuriating saga of lobbyists, politicians, and even the scientific establishment making terrible choices for humanity, but it's also a hopeful account of the people figuring out what needs to be done -- and trying to do it.
Subjects: Agricultural systems.; Climatic changes.; Food security.; Food supply; Human ecology.; Sustainable agriculture.;
Available copies: 0 / Total copies: 1
unAPI

Smart homes in easy steps : master smart technology for your home. by Vandome, Nick,author.;
Subjects: Intelligent personal assistants (Computer software); Wireless communication systems.; Home automation.; Home computer networks.; Household electronics.; Dwellings; Home entertainment systems.;
Available copies: 1 / Total copies: 1
unAPI

Firewall [videorecording (DVD)] by Bettany, Paul,1971-; Ford, Harrison,1942-; Madsen, Virginia,1963-; Warner Home Video;
Director, Richard Loncraine.Harrison Ford, Paul Bettany, Virginia Madsen.I.T. expert Jack Stanfield's wife and children are being held hostage. The kidnappers have one demand: Jack must steal $100 million from the ultra-secure system he designed. And they'll be watching every move he makes.Canadian Home Video Rating: 14A.DVD ; widescreen presentation.
Subjects: Bank robberies; Feature films; Hostages; Thrillers (Motion pictures, television, etc.); Video recordings for the hearing impaired;
© c2006., Warner Home Video,
Available copies: 1 / Total copies: 1
unAPI

Hacking / by Beaver, Kevin,author.;
Includes bibliographical references and index.pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes.Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.
Subjects: Computer security.; Computer networks; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

Zero days / by Ware, Ruth,author.;
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer in this unputdownable and heart-pounding mystery from an author whose "propulsive prose keeps readers on the hook and refuses to let anyone off until all has been revealed" (Shelf Awareness)"--
Subjects: Thrillers (Fiction); Psychological fiction.; Novels.; Husbands; Married people; Murder; Suspects (Criminal investigation);
Available copies: 2 / Total copies: 2
unAPI

The last murder at the end of the world / by Turton, Stuart,author.;
"From the bestselling author of The 7 1/2 Deaths of Evelyn Hardcastle and The Devil and the Dark Water comes an inventive, high-concept murder mystery: an ingenious puzzle, an extraordinary backdrop, and an audacious solution. Solve the murder to save what's left of the world. Outside the island there is nothing: the world was destroyed by a fog that swept the planet, killing anyone it touched. On the island: it is idyllic. One hundred and twenty-two villagers and three scientists, living in peaceful harmony. The villagers are content to fish, farm and feast, to obey their nightly curfew, to do what they're told by the scientists. Until, to the horror of the islanders, one of their beloved scientists is found brutally stabbed to death. And then they learn that the murder has triggered a lowering of the security system around the island, the only thing that was keeping the fog at bay. If the murder isn't solved within 92 hours, the fog will smother the island-and everyone on it. But the security system has also wiped everyone's memories of exactly what happened the night before, which means that someone on the island is a murderer-and they don't even know it. And the clock is ticking"--
Subjects: Thrillers (Fiction); Dystopian fiction.; Novels.; Amnesia; End of the world; Fog; Islands; Murder; Scientists; Scientists;
Available copies: 2 / Total copies: 2
unAPI