Search:

Networking for dummies / by Lowe, Doug.(CARDINAL)214958;
Subjects: Computer networks.;
Available copies: 1 / Total copies: 1
unAPI

The Phalanx code / by Tata, A. J.(Anthony J.),1959-author.(CARDINAL)565126;
"Garrett Sinclair escapes from prison to rescue his team from the manipulations of two tech moguls and learns of a devastating family secret in the process. Influential tech magnate Mitch Drewson calls on Sinclair and the Dagger team to protect his Project Optimus. An ambitious endeavor to empower citizens to protect financial and personal data in the face of increasingly authoritarian federal governments, Project Optimus is a threat to Aurelius Blanc's Phalanx Corporation. Blanc's data collection and media application is enabling a global security state through partnerships with the major industrialized nations, creating a technofascism that monitors the activity of everyone with a smartphone, tablet, computer, or any web connected device. When Phalanx assassin squads overrun an Optimus server farm in California and attack an Optimus coder named Blair Campbell, Sinclair must deploy the troops that Drewson has marshalled to save Blair and protect the remainder of the Optimus team so they can finish their important work--which includes deciphering the mysterious Phalanx Code, suspected to be Phalanx' kill list of Optimus employees. With Phalanx squads hunting him and those he loves, Sinclair must determine who he can trust while a part of his past comes back to haunt him and threaten everything he holds dear. Nonstop action and authentic detail makes this the strongest entry yet in the thrilling Garrett Sinclair series"--
Subjects: Thrillers (Fiction); Assassins; Computer security; Family secrets;
Available copies: 3 / Total copies: 5
unAPI

Code your own website : a really useful guide to basic programming / by Basher, Simon,illustrator.(CARDINAL)487413; theCoderSchool,author.(CARDINAL)798620; Toucan Books Ltd,author,designer.;
The internet -- Online safety -- Website tools -- HTML -- CSS -- JavaScript -- Dynamic server -- Coding a website app.Imagine the world of website coding as a place packed with colorful characters. Let them describe how the internet works. Find out the big names in coding, and follow simple steps to create your own website app. Code your own website: Tours the internet and introduces major components, from URL and domain to browser and router. Looks closely at online safety, and helps spot the good guys ... and the bad ones. Introduces the three big coding languages: HTML, CSS, and JavaScript. Shows you how to code your own website app.
Subjects: Web site development; Computer programming; Programming languages (Electronic computers); Cascading style sheets; HTML (Document markup language); JavaScript (Computer program language);
Available copies: 6 / Total copies: 9
unAPI

The filter bubble : what the Internet is hiding from you / by Pariser, Eli,author.(CARDINAL)480237;
Includes bibliographical references and index.The race for relevance -- The user is the content -- The Adderall society -- The you loop -- The public is irrelevant -- Hello, world! -- What you want, whether you want it or not -- Escape from the city of ghettos.In December 2009, Google began customizing its search results for all users, and we entered a new era of personalization. With little notice or fanfare, our online experience is changing as the web sites we visit are increasingly tailoring themselves to us. In this engaging and visionary book, MoveOn.org board president Eli Pariser lays bare the personalization that is already taking place on every major web site, from Facebook to AOL to ABC News. As Pariser reveals, this new trend is nothing short of an invisible revolution in how we consume information, one that will shape how we learn, what we know, and even how our democracy works. The race to collect as much personal data about us as possible, and to tailor our online experience accordingly, is now the defining battle for today's internet giants like Google, Facebook, Apple, and Microsoft. Behind the scenes, a burgeoning industry of data companies is tracking our personal information--from our political leanings to the hiking boots we just browsed on Zappos--to sell to advertisers. As a result, we will increasingly each live in our own unique information universe--what Pariser calls "the filter bubble." We will receive mainly news that is pleasant and familiar and confirms our beliefs--and since these filters are invisible, we won't know what is being hidden from us. Out past interests will determine what we are exposed to in the future, leaving less room for the unexpected encounters that spark creativity, innovation, and the democratic exchange of ideas. Drawing on interviews with both cyberskeptics and cyberoptimists, from the cofounder of OkCupid, an algorithmically driven dating web site, to one of the chief visionaries of the U.S. information warfare, The Filter Bubble tells the story of how the internet, a medium built around the open flow of ideas, is closing in on itself under the pressure of commerce and "monetization." It peeks behind the curtain at the server farms, algorithms, and geeky entrepreneurs that have given us this new reality and investigates the consequences of corporate power in the digital age. 'The Filter Bubble' reveals how personalization could undermine the internet's original purpose as an open platform for the spread of ideas and leave us all in an isolated, echoing world. But it is not too late to change course. Pariser lays out a new vision for the web, one that embraces the benefits of technology without turning a blind eye to its negative consequences and will ensure that the internet lives up to its transformative promise.
Subjects: Invisible Web.; Information organization.; Semantic Web; World Wide Web; Internet;
Available copies: 3 / Total copies: 3
unAPI

How to do everything : iPhone 4S / by Hart-Davis, Guy.(CARDINAL)352260;
Get your iPhone and set it up -- Load your iPhone with music, videos, and data -- Connect your iPhone to wireless networks and the internet -- Choose essential settings on your iPhone -- Take, edit, and share photos and videos -- Install and manage apps on your iPhone -- Make phone calls and video calls -- Communicate via e-mail and instant messaging -- Surf the web on your iPhone -- Keep your calendars and contacts up to date -- Enjoy music and video on your iPhone -- Make the most of the built-in apps -- Create a great audio and video library for the iPhone and iTunes -- Use your iPhone for file backup, storage, and transform -- Connect to your company's network via VPN -- Connect your iPhone to your company's exchange server -- Create, edit, and share business documents on your iPhone -- Take your iPhone to the limit -- Trouble shoot your iPhone -- Troubleshoot iTunes.This hands-on guide explains how to video chat using FaceTime, load music, videos, and data onto the iPhone, use email, surf the web, keep up with social media accounts, take photos, create and edit business documents, and much more. Find out how to fully exploit the iPhone with both Windows PCs and Macs.
Subjects: iPhone (Smartphone); Pocket computers.; Smartphones.;
Available copies: 1 / Total copies: 2
unAPI

Tor darknet series : master the art of invisibility / by Henderson, Lance,author.;
Burners & Black markets -- Darknet -- Tor & the dark art of anonymity -- Usenet : the ultimate guide -- Escape the west!5 Books for the Price of 1!Darknet: The ULTIMATE Guide on the Art of Invisibility. Want to surf the web anonymously? Cloak yourself in shadow? I will show you how to become a ghost in the machine - leaving no tracks back to your ISP. This book covers it all! Encrypting your files, securing your PC, masking your online footsteps with Tor browser, VPNs, Freenet and Bitcoins, and all while giving you peace of mind with TOTAL 100% ANONYMITY.- How to Be Anonymous Online AND Offline- Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more- Browser Fingerprinting- Anti-Hacking and Counter-forensics Techniques- Photo & Video Metadata- How to Encrypt Files (I make this super simple)- How to Defeat NSA Spying- How to Browse the Deep Web- How to Protect Your Identity- How to Hide Anything! Tor & The Dark Art of Anonymity. The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you - but there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Covered in Tor:- Browse the Internet Anonymously- Darkcoins, Darknet Marketplaces & Opsec. Requirements- Tor Hidden Servers - How to Not Get Caught- Counter-Forensics the FBI Doesn't Want You to Know About!- Windows vs. Linux Network Security- Cryptocurrency (Real Bitcoin Anonymity)- Supercookies & Encryption- Preventing Marketers and Debt Collectors From Finding You- How to Protect Your Assets - Home, Money & Family!- How to Hide Anything from even the most trained IRS agents. The Invisibility ToolkitWithin this book lies top secrets known only to the FBI and a few law enforcement agencies: How to disappear in style and retain assets. How to switch up multiple identities on the fly and be invisible such that no one; not your ex, not your parole officer, nor even the federal government can find you. Ever. You'll learn:- How to disappear overseas- How to wear a perfect disguise. - How to bring down a drone. - How to be invisible in Canada, Thailand, China or the Philippines. - How to use Darkcoins on the run.- How to fool skip tracers, child support courts, student loan collectors- How to sneak into Canada- How to be anonymous online using Tor, Tails and the Internet Underground- Edward Snowden's biggest mistake. Usenet: The Ultimate Guide The first rule of Usenet: Don't Talk About Usenet! But times have changed and you want what you want. Usenet is the way to go. I will show you:- How to use Usenet - which groups to join, which to avoid- How to be anonymous online- Why Usenet is better than torrents- How to use Tor, How to use PGP, Remailers/Mixmaster, SSL.- How to encrypt your files- Which Vpn and Usenet companies rat you out, and which won't.- How to Stay Anonymous Online You've probably read The Hacker Playbook by Peter Kim and the Art of Invisibility by Kevin Mitnick. While those are fine books, you need this super pack to take it to the NEXT LEVEL.
Subjects: Handbooks and manuals.; Invisible Web; Dark Web;
Available copies: 1 / Total copies: 1
unAPI

The Wikipedia revolution : how a bunch of nobodies created the world's greatest encyclopedia / by Lih, Andrew.(CARDINAL)494263;
Includes bibliographical references (pages 231-235) and index.A Wikipedia expert tells the inside story of the trailblazing--and incredibly popular--open source encyclopedia.
Subjects: Wikipedia.; Electronic encyclopedias.; User-generated content.;
Available copies: 1 / Total copies: 2
unAPI

SQL / by Taylor, Allen G.,author.(CARDINAL)759158;
Getting started with SQL. Relational database fundamentals ; SQL fundamentals ; The components of SQL -- Using SQL to build databases. Building and maintaining a simple database structure ; Building a multi-table relational database -- Storing and retrieving data. Manipulating database data ; Handling temporal data ; Specifying valuse ; Using advanced SQL value expressions ; Zeroing in on the data you want ; Using relational operators ; Delving deep with nested queries ; Recursive queries -- Controlling operations. Providing database security ; Protecting data ; Using SQL within applications -- Taking SQL to the real world. Accessing data with ODBC and JDBC ; Operating on SML data with SQL ; SQL and JSON -- Advanced topics. Stepping through a dataset with cursors ; Adding procedural capabilities with persistent stored modules ; Handling errors ; Triggers -- The part of tens. Ten common mistakes ; Ten retrieval tips -- Appendix: ISO/IEC SQL: 2016 reserved words.Get ready to make SQL easy! Updated for the latest version of SQL, the new edition of this perennial bestseller shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. Covering everything you need to know to make working with SQL easier than ever, topics include how to use SQL to structure a DBMS and implement a database design; secure a database; and retrieve information from a database; and much more. SQL is the international standard database language used to create, access, manipulate, maintain, and store information in relational database management systems (DBMS) such as Access, Oracle, SQL Server, and MySQL. SQL adds powerful data manipulation and retrieval capabilities to conventional languages--and this book shows you how to harness the core element of relational databases with ease. --
Subjects: SQL (Computer program language); Database management.;
Available copies: 1 / Total copies: 1
unAPI

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
Available copies: 2 / Total copies: 2
unAPI

E-metrics for library and information professionals : how to use data for managing and evaluating electronic resource collections / by White, Andrew C.(Andrew Carl),1966-(CARDINAL)278616; Kamal, Eric Djiva,1968-(CARDINAL)278615;
Includes bibliographical references (pages 229-243) and index.Defining e-metrics -- Using e-metrics in libraries -- Understanding vendor-supplied e-metrics -- Using e-metrics for public relations -- Using e-metrics for collection management -- Using e-metrics for library administration -- E-metrics and e-resources: designing solutions to capture usage statistics on e-journals, databases, e-books, and digital documents -- E-metrics and infrastructure: assessing servers, workstations, and other technical considerations -- E-metrics and staffing: creating the team and defining the project -- E-metrics and the future: standards, restrictions, implementation, and emerging technologies."White and Kamal show how to use e-metrics to measure library performance and value in the digital age. With this book, you can learn how to use effectively the electronic data captured from various network activities to manage library collections, budgets, and services. Using e-metrics, the authors identify expensive and underused digital resources, visualize virtual user behaviour patterns, and construct new collection development strategies."--Jacket.
Subjects: Digital libraries; Electronic information resources; Web usage mining.;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI