Catalog Search Results
121) The digital age
Series
Reference shelf volume 87, no. 4
Pub. Date
2015.
Description
"Digital technology has transformed our lives so completely that we hardly recognize it and so quickly that we have yet to grasp its implications. No industry has been left untouched; every aspect of how we communicate and how and where we get our information has been affected. We are connected as never before. Even the chief justice of the U.S. Supreme Court has said that a cellphone can contain the"sum of an individual's private life"--surely a...
123) Hot seat
Pub. Date
[2022]
Description
A reformed hacker turned cyber security technician finds himself in the HOT SEAT when he realizes that he's just armed a bomb under his chair and he's forced to help a maniacal anonymous caller pull off an impossible cyber robbery.
Author
Pub. Date
2013.
Description
"Cyberbullying among teens happens every day. Harsh words and damaging photos exchanged through texts, email, or social media can result in humiliation, broken friendships, punishment at school, and even legal prosecution. In some cases, online harassment has contributed to suicide. Faced with this frightening problem, parents, educators, and teens are looking for information and advice. But few cyberbullying resources speak to teens themselves. Written...
125) Mr. Robot: Season 1
Pub. Date
2016
Description
Enter the "completely captivating" world of Mr. Robot. Cyber-security engineer by day and vigilante hacker by night, Elliot finds himself at a crossroads when the mysterious leader of an underground hacker group recruits him to destroy the firm he is paid to protect. Compelled by his personal beliefs, Elliot struggles to resist the chance to take down the multinational CEOs he believes are running (and ruining) the world.
Author
Formats
Description
"IT BEGAN WITH A TANTALIZING, ANONYMOUS EMAIL: "I AM A SENIOR MEMBER OF THE INTELLIGENCE COMMUNITY." What followed was the most spectacular intelligence breach ever, brought about by one extraordinary man. Edward Snowden was a 29-year-old computer genius working for the National Security Agency when he shocked the world by exposing the near-universal mass surveillance programs of the United States government. His whistleblowing has shaken the leaders...
127) The Cipher
Author
Pub. Date
℗♭2015.
Description
Robert 'Smiles' Smylie and his friend Ben become embroiled in a high-stakes negotiation with a pair of suspicious Feds when Ben cracks a code with the power to unlock all the Internet's secrets.
129) Hackers
Pub. Date
1998
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
131) The Fifth Estate
Pub. Date
2014
Description
Based on true events, this global thriller takes you behind the headlines. WikiLeaks founder Julian Assange and his colleague Daniel Domscheit-Berg team up to become underground watchdogs of the very powerful. They create a platform that allows whistleblowers to anonymously leak covert data. But when Assange and Berg gain access to the biggest trove of confidential intelligence documents in U.S. history, they battle each other and a defining question...
Author
Series
Pub. Date
2022.
Description
From #1 New York Times bestselling, Hugo Award–winning author Brandon Sanderson, and co-authors Max Epstein, David Pace, and Michael Harkins, comes an audio-first techno-thriller addition to the universe of Stephen (Legion) Leeds. Stephen Leeds is perfectly sane. It's his hallucinations who are all quite mad.A one-man team of experts, Stephen Leeds is a genius of unparalleled mental capabilities who can learn new skills or master entire scholarly...
133) Snowden
Pub. Date
[2016]
Description
The incredible untold story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world. He is considered a hero by some, and a traitor by others.
134) Cyberbully
Pub. Date
[2012]
Description
Taylor Hillridge is a seventeen-year-old girl who falls victim to online bullying. Taylor receives a computer for her birthday and soon finds herself the victim of betrayal and bullying while on a social website. Afraid to face her peers at school (including her best friends), she is pushed to an extreme breaking point. Taylor's mom takes on the school system and state legislation to help others from going through similar ordeals.
Author
Series
Pub. Date
[2013]
Description
Cyberspace is the 21st century's greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Cybersecurity expert and professor Paul Rosenzweig delivers your guide to understanding the intricate nature...
136) Untraceable
Pub. Date
c2008
Description
Jennifer Marsh is an FBI secret service agent who gets caught up in a very personal and deadly cat-and-mouse game with a serial killer. The killer knows that people are drawn to the curious and the dark side of things. They will log onto an 'untraceable' website where the killer conducts violent and painful murders live on the internet. The more people who log on and enter the website, the quicker and more violently the victim dies.
Series
Pub. Date
2013.
Description
Domestic disturbance: A father discovers that his son's new stepfather is not who he pretends to be -- Face/off: Government agent Sean Archer, whose son was killed in an assassination attempt by Castor Troy, years later assumes Castor's face in order to bring down Troy's terrorist group, while Castor uses the same technique to assume Archer's identity -- The general's daughter: A military investigator is determined to uncover the truth behind a...