Catalog Search Results
Discover leading business and technical publications in the computer, telecommunications, and electronics industries.
1) Warcross
Author
Series
Warcross volume 1
Language
English
Appears on list
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
2) Ghost ship
Author
Series
Language
English
Description
"The dazzling new novel in the #1 New York Times-bestselling series from Clive Cussler, the grand master of adventure. When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown, or was the yacht abandoned when he came aboard? For reasons he cannot explain, Kurt doesn't trust either version of his recollection. Determined...
3) Blackout
Author
Language
English
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Author
Series
Mortality doctrine volume 1
Language
English
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--
Author
Language
English
Formats
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Publisher
Harvard University Press
Pub. Date
2014.
Language
English
Description
"Most Internet users are familiar with trolling--aggressive, foul-mouthed posts designed to elicit angry responses in a site's comments. Less familiar but far more serious is the way some use networked technologies to target real people, subjecting them, by name and address, to vicious, often terrifying, online abuse. In an in-depth investigation of a problem that is too often trivialized by lawmakers and the media, Danielle Keats Citron exposes the...
9) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2022.
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
11) Cyberterrorism
Series
Publisher
Greenhaven Publishing
Pub. Date
2022.
Language
English
Description
"Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--
Series
Publisher
U.S. Postal Inspection Service
Pub. Date
c2005
Language
English
Description
Criminals from around the world are using bogus e-mails and legitimate looking web sites to trick unsuspecting people. Once duped, they drain your bank accounts and wreck your finances. This dramatic film is a presentation of the United States Postal inspection Service. It tells the story of the international efforts to stop these scams and provides tips on how you can avoid being tricked by these criminals.
Author
Publisher
W.W. Norton & Company
Pub. Date
[2018]
Language
English
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
Author
Series
Publisher
ReferencePoint Press, Inc
Pub. Date
[2019]
Language
English
Appears on list
Description
Digital devices such as cell phones, laptops, smart watches, fitness trackers, and more connect the world together and make life more convenient. Many people have become so dependent on digital technology that they could not conduct their business or manage their daily lives without it. They sleep with smart phones by their pillows, as if the device were an extension of the body. The more people rely on technology, however, the more vulnerable they...
Author
Publisher
Dutton
Pub. Date
c2012
Language
English
Description
An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg.
In Interlibrary Loan
Didn't find what you need? Items not owned by Jackson County Oregon can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request