Catalog Search Results
Discover leading business and technical publications in the computer, telecommunications, and electronics industries.
Author
Language
English
Formats
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Publisher
Harvard University Press
Pub. Date
2014.
Language
English
Description
"Most Internet users are familiar with trolling--aggressive, foul-mouthed posts designed to elicit angry responses in a site's comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the...
Author
Publisher
W.W. Norton & Company
Pub. Date
[2018]
Language
English
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
Author
Publisher
IntelTechniques.com
Pub. Date
2016.
Language
English
Description
"Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This...
Author
Publisher
Houghton Mifflin Harcourt
Pub. Date
2014.
Language
English
Description
The United States military now views cyberspace as the "fifth domain" of warfare, alongside land, air, sea, and space. The Pentagon, the National Security Agency, and the CIA field teams of hackers who launch cyber strikes against enemy targets--and amass staggering quantities of personal information on all of us. These same virtual warriors, along with a growing band of private-sector counterparts, are charged with defending us against the vast array...
8) README.txt
Author
Language
English
Description
An intimate, revealing memoir from activist, politician, and WikiLeaks whistleblower Chelsea Manning-sharing her life story as a soldier and her journey toward self-acceptance as a trans woman with a manifesto for transparency of identity for all.
In 2010, Chelsea Manning, working as an intelligence analyst in the U.S. Army in Iraq, disclosed 720,000 classified military documents that she had smuggled out via the memory card of her digital camera....
In Interlibrary Loan
Didn't find what you need? Items not owned by Jackson County Oregon can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request