Search:

Hot seat [videorecording] / by Asghari, Sam,actor.; Bressack, James Cullen,film director.; Dillon, Kevin,actor.; Doherty, Shannen,actor.(CARDINAL)538368; Emmett, Randall,film producer.(CARDINAL)845876; Furla, George,film producer.(CARDINAL)346672; Gibson, Mel,actor.(CARDINAL)749045; Harr, Anna,2000-actor.; Hull, Lydia,actor.; Katzman, Kate,actor.; Langford, Leon,screenwriter.; Richbow, Ceasar,film producer.; Sanghani, Shaun,1980-film producer.; Steeples, Eddie,1973-actor.; Verdi, Chad A.,film producer.; Watts, Collin,screenwriter.; Welch, Michael,1987-actor.; 5 Star Films,presenter,production company.; Arcana Studio,production company.(CARDINAL)492733; Bondit Media Capital,production company.; Grindstone Entertainment Group,presenter.; Head Gear Films,production company.(CARDINAL)606377; Lions Gate Entertainment (Firm),presenter,publisher.(CARDINAL)340129; Metrol Technology,production company.(CARDINAL)793392; SSS Entertainment (Firm),production company.; Verdi Productions,production company.;
Director of photography, Bryan Koss ; editor, R.J. Cooper ; music, Timothy Stuart Jones.Kevin Dillon, Mel Gibson, Shannen Doherty, Michael Welch, Sam Asghari, Eddie Steeples, Lydia Hull, Anna Harr, Kate Katzman.A reformed hacker turned cyber security technician finds himself in the HOT SEAT when he realizes that he's just armed a bomb under his chair and he's forced to help a maniacal anonymous caller pull off an impossible cyber robbery.MPA rating: R; for language throughout and some violence.DVD; region 1, NTSC; widescreen; Dolby digital 5.1.
Subjects: Action and adventure films.; Feature films.; Fiction films.; Thrillers (Motion pictures); Video recordings for the hearing impaired.; Bombs; Computer crimes; Hackers;
Available copies: 7 / Total copies: 7
unAPI

Sandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers / by Greenberg, Andy,author.(CARDINAL)399687;
Includes bibliographical references and index."In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software to shipping. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage--the largest, most devastating cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national stability and security. As the Kremlin's role in meddling in the 2016 election, manipulating foreign governments, and sparking chaos comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the line between digital and physical conflict, between wartime and peacetime, have begun to blur--with world-shaking implications"--
Subjects: Computer crimes; Hackers;
Available copies: 17 / Total copies: 17
unAPI

70 north / by Woodhouse, Kimberley,1973-author.(CARDINAL)353143;
"Buckle in for the bone-chilling finale! The Cyber Solutions team has managed to stay one step ahead of the madman who has killed so many, stopping him before reaching his ultimate goals. From the original 26 Below cyberattack in Fairbanks to the 8 DOWN serial murders in Anchorage and beyond, they matched wits with the killer and won in the end. But final judgment is coming. And this time, there may be no stopping him. David "Mac" McPherson has a personal stake in making sure this predator stays down for good. His family died in the Fairbanks attacks. Mac knows that God says "vengeance is mine"-but surely an exception can be made. Surgeon Tracie Hunter is determined to stay sober and keep saving lives in Fairbanks, Alaska-even if it means being a little obsessive. After all, that same kind of determination is how she kept Mac alive after the monster attacked him. And she won't let Mac run himself into the grave looking for payback; he's come to mean too much to her. Then someone hacks into the system at Tracie's previous job as a medical examiner and frames her in a murder cover-up. There's no one else skilled enough to create a digital trail this incriminating--the killer is back in action, exploiting cybersecurity weaknesses that will destroy lives. Can Mac stay focused and stop the next attack when his own personal vulnerability is exposed? Or will his need to make someone pay for his pain allow the maniac to pull ahead and win at last? Kimberley Woodhouse takes readers on another intense thrill ride in this epic close to her cybercrime series based on real-world possibilities"--
Subjects: Christian fiction.; Thrillers (Fiction); Novels.; Computer security; Computer crimes; Serial murderers;
Available copies: 4 / Total copies: 4
unAPI

Digital clues / by Campbell, Grace,1993-author.(CARDINAL)846328;
Includes bibliographical references and index."From your cell phone signal to your personal information, text messages to your search history, criminals and investigators are able to access all of it using the right tools. Discover how investigators solve crimes using digital forensics."--Ages 8-13Grades K-1
Subjects: Computer crimes; Computer crimes; Digital forensic science; Computer crimes.; Computer crimes; Digital forensic science.;
Available copies: 1 / Total copies: 2
unAPI

Công dân tuân thủ pháp luật / by Yu, Lei,author.(CARDINAL)721507; Hải Dương,translator.;
Subjects: Detective and mystery fiction; Computer crimes; Serial murder investigation;
Available copies: 1 / Total copies: 1
unAPI

Cyber crime secrets / by Townsend, John,1955-(CARDINAL)674045;
MARCIVE 4/3/12Includes bibliographical references (page 32) and index.The digital age -- Cyber vandals -- Cyber theft -- Spam scam -- Identity theft -- Terrorism -- Cyber forensics -- Case study : clues to a murder -- GPS spies -- Cell phone secrets -- Case study : cell phone evidence -- Catching criminals -- What next?."Presents different ways cyber crime is committed and the many ways electronic equipment can be used to solve crimes. Includes case files and case studies from real cyber crime situations"--
Subjects: Computer crimes; Cyberterrorism;
Available copies: 1 / Total copies: 2
unAPI

Hacked / by Higgins, M. G.,author.(CARDINAL)397340;
Hacked! -- White hats, black hats -- Malware -- Attacks on companies -- Cyber war -- Cyber terror -- Defense and offense -- Behind the scenes -- Staying cyber safe -- The cyber future -- GlossaryFOR USE IN SCHOOLS AND LIBRARIES ONLY. Look out! Your computer data is not safe. There are hackers who will steal it. Sell it. Or destroy it. The hackers are getting smarter. They leave little trace as to their identities. And there are dangerous consequences for individuals, corporations, and governments. Engage your most struggling readers in grades 3-8 with Red Rhino Nonfiction! This new series features high-interest topics in every content area. Visually appealing full-color photographs and illustrations, fun facts, and short chapters keep emerging readers focused. Written at a 1.5-1.9 readability level, these books include pre-reading comprehension questions and a 20-word glossary for comprehension support.HL100LAccelerated Reader AR
Subjects: Computer crimes; Hackers;
Available copies: 1 / Total copies: 1
unAPI

Desert pursuit / by Bokal, Jennifer D.,author.(CARDINAL)416351;
"Brand-new Texas Law operative Theo Fowler has one mission: to take down deadly hacker Seraphim. But in the process, he's got to battle Seraphim's partner--a terrifying serial killer in pursuit of the child he had with his former flame, Anastasia Pierce. Somehow, Anastasia has kept the child a secret for years--but now the murderer is hot on her trail. With cybersecurity guru Theo by her side, she's got a fighting chance of survival. Yet somehow the serial killer seems to know their every move, and Theo and Ana don't know who to trust ...except one another"--
Subjects: Romantic suspense fiction.; Thrillers (Fiction); Romance fiction.; Novels.; Man-woman relationships; Computer crimes; Computer security;
Available copies: 2 / Total copies: 3
unAPI

Fatal system error : the hunt for the new crime lords who are bringing down the Internet / by Menn, Joseph.(CARDINAL)784994;
Includes bibliographical references (pages 251-265) and index.Introduction -- Part 1 -- 1: Wargames -- 2: Hardcore vs exe -- 3: In too deep -- 4: Turn -- 5: Crackdown -- 6: From spam to identity theft -- Part 2 -- 7: Whatever it takes -- 8: Day of action -- 9: Underground economy -- 10: Trial -- 11: Beyond crime -- 12: Fixing what's fixable -- Epilogue -- Author's note -- Notes -- Index.From the Publisher: In this disquieting cyber thriller, Joseph Menn takes readers into the murky hacker underground, traveling the globe from San Francisco to Costa Rica and London to Russia. His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government. Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought-and why the Internet might not survive.
Subjects: Computer crimes.; Hackers.; Internet fraud.;
Available copies: 1 / Total copies: 1
unAPI

No safe harbor : the inside truth about cybercrime--and how to protect your business / by Sangster, Mark,author.;
Includes bibliographical references (pages 161-169) and index.Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stop crime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies--and why do they go after the small ones? And, most importantly, how can companies of all sizes protect themselves? Cybersecurity expert Mark Sangster deftly weaves together real-life cases in a thrilling narrative that illustrates the human complexities behind the scenes that can lead to companies throwing their digital front doors open to criminals. Within a security context, deep social engineering is the newest and biggest means of breaching our systems. Sangster shows readers that cybersecurity is not an IT problem to solve--it is a business risk to manage. Organizations need to shift the security discussion away from technology gates alone toward a focus on leadership, team behaviors, and mutual support. Sangster punctuates his eye-opening narratives with sets of questions businesspeople at all levels need to ask themselves, facts they need to know, and principles they need to follow to keep their companies secure.
Subjects: Business enterprises; Computer security.; Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI