Catalog Search Results
Author
Publisher
W.W. Norton and Company
Pub. Date
[2023]
Language
English
Description
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our...
3) Hush-hush
Author
Series
Stone Barrington novel volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
5) Mind games
Author
Publisher
Swoon Reads
Pub. Date
2019.
Language
English
Description
"Arden sells memories. Whether it's becoming homecoming queen or studying for that all important test, Arden can hack into a classmate's memories and upload the experience for you just as if you'd lived it yourself. Business is great, right up until the day Arden whites out, losing fifteen minutes of her life and all her memories of the boy across the school yard. The boy her friends assure her she's had a crush on for years. Arden realizes that...
Author
Series
Pub. Date
2020.
Language
English
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Publisher
HypaSec
Pub. Date
[2019]
Language
English
Appears on list
Description
Come along on a technology misadventure, learning OSINT tools & techniques while traveling on a hacker journey. Protect your organisation or find out if your home alarm system is exposed insecurely to the internet. Discover weaknesses in IT, IOT and ICS SCADA systems in-depth. Using Censys, Spiderfoot, ZMap, OWASP ZAP, Maltego and other tools to discover a wide range of vulnerable systems and information. Smart appliances, North American Open ADR...
10) Someone we know
Author
Language
English
Description
"The new domestic suspense novel from NYT bestselling author Shari Lapena. Maybe you don't know your neighbours as well as you thought you did ... 'This is a very difficult letter to write. I hope you will not hate us too much ... My son broke into your home recently while you were out.' In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well--learning their secrets, and maybe...
Author
Publisher
Createspace Independent Publishing Platform
Pub. Date
[2018].
Language
English
Description
"Computer programming doesn't have to be complicated. When you start with the basics it's actually quite simple. That is what Cyberpunk Architects are all about. We take pride in giving people the blueprint for everything related to computer programming and computer programming languages. We include Python programming, Raspberry Pi, SQL, Java, HTML and a lot more"--publisher.
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2023.
Language
English
Description
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the...
Author
Publisher
Houghton Mifflin Harcourt
Pub. Date
2018.
Language
English
Description
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations....
Author
Publisher
Harvard University Press
Pub. Date
2020.
Language
English
Appears on list
Description
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
20) The con
Author
Series
Genius volume 2
Publisher
Feiwel and Friends
Pub. Date
2017.
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 11
Lexile measure
670L
Language
English
Description
Three young geniuses from around the globe hatch a plot to trick a vicious warlord, infiltrate a mastermind's organization, protect their families, and save the world.
Tunde, self-taught engineering genius from Nigeria, is in a race against time to save his village from a ruthless warlord. Painted Wolf, activist blogger and strategist from China, is searching for a way to rescue her father from the corruption he's inadvertently been caught up in....