Catalog Search Results
Author
Publisher
W.W. Norton and Company
Pub. Date
[2023]
Description
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our...
2) Hackers
Author
Series
Publisher
QEB
Pub. Date
2019
Description
What are hackers? Are they good? Bad? What can we do to protect ourselves, businesses and society against hackers? How can we control them? And should we try?
4) Hush-hush
Author
Series
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Description
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away.
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the...
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the...
Author
Series
Publisher
Mason Crest
Pub. Date
[2020]
Description
"Readers of Cool Careers In Science will discover ten cutting-edge science, technology, and engineering careers, and dozens of subspecialties and will also learn why these careers are some of the most exciting, best paying, and fastest growing occupations in the world"--
Author
Series
Publisher
Tor
Pub. Date
2020.
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Publisher
Vision Films
Pub. Date
[2023]
Description
In a dystopian future, a deadly virus devastates the planet. The greedy CEO of a tech conglomerate controls the earth from space with an iron fist, and The People's Army, in their quest for power, doesn't care who gets caught in the crossfire. One man, together with the CEO's daughter, will use virtual reality, his cyberpunk hacking skills, and her brilliant mind to save mankind.
Author
Pub. Date
[2019]
Description
"The new domestic suspense novel from NYT bestselling author Shari Lapena. Maybe you don't know your neighbours as well as you thought you did.... 'This is a very difficult letter to write. I hope you will not hate us too much... My son broke into your home recently while you were out.' In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well--learning their secrets, and maybe sharing...
10) Watch dogs 2
Publisher
Ubisoft
Pub. Date
[2016] ©2016
Description
Check out the birthplace of the tech revolution as Marcus Holloway, a brilliant young hacker who has fallen victim to ctOS 2.0's predictive algorithms and accused of a crime he did not commit. In Marcus' mission to shut down ctOS 2.0 for good, hacking is his ultimate weapon. Players not only can hack into the San Francisco Bay Area's infrastructure, but also into every person and any connected device they possess to trigger unpredictable chains of...
Author
Publisher
Wednesday Books
Pub. Date
2022.
Accelerated Reader
IL: UG - BL: 4.8 - AR Pts: 14
Description
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
Author
Publisher
Crown Publishers
Pub. Date
[2018]
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
13) 1st case
Author
Formats
Description
"Recruited into the FBI when her unorthodox programming skills get her kicked out of MIT, a computer genius tracks a killer who has been targeting young women through a sophisticated messaging app."--
Author
Formats
Description
"Now that every detail and argument set forth in the #1 New York Times bestseller The Russia Hoax has been borne out by the Mueller report, the author is back with a hard-hitting, well-reasoned evisceration of what may be the dirtiest trick in political history"--
Washington insiders broke rule after rule investigating a Russian conspiracy that turned out not to exist. Somehow this was spun into Donald Trump having something to hide. Jarrett uncovers...
Author
Series
Publisher
Recorded Books, Inc
Pub. Date
[2022]
Description
From #1 New York Times bestselling, Hugo Award–winning author Brandon Sanderson, and co-authors Max Epstein, David Pace, and Michael Harkins, comes an audio-first techno-thriller addition to the universe of Stephen (Legion) Leeds. Stephen Leeds is perfectly sane. It's his hallucinations who are all quite mad.A one-man team of experts, Stephen Leeds is a genius of unparalleled mental capabilities who can learn new skills or master entire scholarly...
17) We are all targets: how renegade hackers invented cyber war and unleashed an age of global chaos
Author
Formats
Description
"The incredible untold origin story of cyberwar and the hackers who unleashed it on the world, tracing their journey from the ashes of the Cold War to the criminal underworld, governments, and even Silicon Valley"--
18) The Mueller report: the final report of the Special Counsel into Donald Trump, Russia, and collusion
Author
Publisher
Skyhorse Publishing
Pub. Date
[2019]
Description
"There has never been a more important political investigation than Robert S. Mueller III's into President Donald Trump's possible collusion with Russia. His momentous findings can be found here, complete with: -- The 300+ pages of the historic report -- An introduction by constitutional scholar, eminent civil libertarian, and New York Times bestselling author Alan Dershowitz. -- The relevant portions of Title 28 of the Code of Federal Regulations,...
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2023.
Description
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the...
Didn't Find It?
If we don't have what you're looking for, you have 3 options: ask us to bring it in from another library (interlibrary loan), suggest the library purchase it, or call us for assistance.
Didn't find it?
Can't find what you are looking for? You can suggest the library purchase it by submitting a request, or you might find it through our interlibrary loan service. See your options at https://readokaloosa.org/requests. Purchase Suggestion