Search:

Fancy Bear goes phishing : the dark history of the information age, in five extraordinary hacks / by Shapiro, Scott J.,author.(CARDINAL)422296;
Includes bibliographical references and index.Introduction: The Brilliant Project -- The great worm -- How the tortoise hacked Achilles -- The Bulgarian virus factory -- The father of dragons -- Winner take all -- Snoop Dogg does his laundry -- How to mudge -- Kill chain -- The Minecraft wars -- Attack of the killer toasters -- Conclusion: The death of solutionism -- Epilogue."A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
Subjects: Case studies.; Hacking; Internet in espionage.; Internet; Phishing;
Available copies: 10 / Total copies: 10
unAPI

The quantum spy / by Ignatius, David,1950-author.;
A hyper-fast quantum computer is the digital equivalent of a nuclear bomb: whoever possesses one will be able to shred any encryption in existence, effectively owning the digital world. The question is: Who will build it first, the United States or China? The latest of David Ignatius's timely, sharp-eyed espionage novels follows CIA agent Harris Chang into a quantum research lab compromised by a suspected Chinese informant. The breach provokes a mole hunt that is obsessive, destructive, and--above all--uncertain: Do the leaks expose real secrets, or are they false trails meant to deceive the Chinese? Chang soon finds that there is a thin line between loyalty and betrayal, as the investigation leads him down a rabbit hole as dangerous as it is deep. Grounded in the real-world global charge toward technological dominance, The Quantum Spy presents a sophisticated game of cat-and-mouse wired to an exhilarating cyber thriller.
Subjects: Large type books.; Suspense fiction.; Thriller fiction.; Spy fiction.; United States. Central Intelligence Agency; Quantum computers; Internet in espionage;
Available copies: 14 / Total copies: 16
unAPI

Top secret science in cybercrime and espionage / by Rodger, Ellen,author.(CARDINAL)470499;
The dark future -- Hack attack -- Connected and vulnerable -- Predators and prey -- Fighting cybercrime -- What next? -- Be a cybercrime specialist."Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This intriguing book will captivate readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security."--Ages 10-14.Grades 7 to 8.1060LAccelerated Reader AR
Subjects: Computer crimes; Computer crimes; Internet in espionage; Information technology;
Available copies: 2 / Total copies: 2
unAPI

The hacked world order : how nations fight, trade, maneuver, and manipulate in the digital age / by Segal, Adam,1968-author.(CARDINAL)670624;
Includes bibliographical references (pages 251-292) and index."The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked World Order, Adam Segal shows how governments use the web to wage war and spy on, coerce, and damage each other. Israel is intent on derailing the Iranian nuclear weapons program. India wants to prevent Pakistani terrorists from using their Blackberries to coordinate attacks. Brazil has plans to lay new fiber cables and develop satellite links so its Internet traffic no longer has to pass through Miami. China does not want to be dependent on the West for its technology needs. These new digital conflicts pose no physical threat-no one has ever died from a cyberattack-but they serve to both threaten and defend the integrity of complex systems like power grids, financial institutions, and security networks. Segal describes how cyberattacks can be launched by any country, individual, or private group with minimal resources in mere seconds, and why they have the potential to produce unintended and unimaginable problems for anyone with an internet connection and an email account. State-backed hacking initiatives can shut down, sabotage trade strategies, steal intellectual property, sow economic chaos, and paralyze whole countries. Diplomats, who used to work behind closed doors of foreign ministries, must now respond with greater speed, as almost instantaneously they can reach, educate, or offend millions with just 140 characters. Beginning with the Stuxnet virus launched by the US at an Iranian nuclear facility in 2010 and continuing through to the most recent Sony hacking scandal, A Hacked World Order exposes how the internet has ushered in a new era of geopolitical maneuvering and reveals the tremendous and terrifying implication on our economic livelihood, security, and personal identity. "--"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked World Order, Adam Segal shows how governments use the web to wage war and spy on, coerce, and damage each other. Israel is intent on derailing the Iranian nuclear weapons program. India wants to prevent Pakistani terrorists from using their Blackberries to coordinate attacks. Brazil has plans to lay new fiber cables and develop satellite links so its Internet traffic no longer has to pass through Miami. China does not want to be dependent on the West for its technology needs. These new digital conflicts pose no physical threat--no one has ever died from a cyberattack--but they serve to both threaten and defend the integrity of complex systems like power grids, financial institutions, and security networks"--
Subjects: Internet and international relations.; Technology and international relations.; Internet in espionage.; Cyberterrorism.; Cyberspace; Hacking;
Available copies: 1 / Total copies: 1
unAPI

The throwaways [videorecording] / by Beach, Jeffery,film producer.; Brooke, Peter,actor.; Bui, Tony,1973-film director.; Caan, James,actor.(CARDINAL)847608; Clarke, Noel,1975-actor.; Dillon, Kevin,actor.; Handfield, Don,screenwriter.; Hillborg, Christian,actor.; Huntington, Sam,1982-actor.(CARDINAL)824703; McGrath, Katie,1983-actor.; Ross, Michael Arlen,screenwriter.; Crackle (Firm),presenter.; Sony Pictures Home Entertainment (Firm),publisher.(CARDINAL)282399;
Music, Jerome Leroy, Alex Kovacs; director of photography, Jose David Montero; editors, Robert Brakey, Ryan Eaton.Sam Huntington, Katie McGrath, Christian Hillborg, Jack Kesy, Peter Brooke, Kevin Dillon, James Caan, Noel Clarke, Darrell D'silva, Valentin Ganev, Don Handfield.Notorious hacker Drew Reynolds is captured by the CIA and given a proposition, work for them or spend the rest of his life in prison. Agreeing on the condition that he can form his own team, he puts together a group of 'throwaways,' the people deemed expendable and seemingly the worst in the organization.MPAA rating: Not rated.DVD ; anamorphic widescreen (1.78:1) presentation ; Dolby digital 5.1 surround.
Subjects: Action and adventure films.; Adventure films.; Feature films.; Fiction films.; Thrillers (Motion pictures); Video recordings for the hearing impaired.; United States. Central Intelligence Agency; Cyberterrorism; Hackers; Internet in espionage;
Available copies: 1 / Total copies: 1
unAPI

The perfect weapon : war, sabotage, and fear in the cyber age / by Sanger, David E.,author.(CARDINAL)356232;
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes--from crippling infrastructure to sowing discord and doubt--cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger--who broke the story of Olympic Games in his previous book--reveals a world coming face-to-face with the perils of technological revolution. "The Perfect Weapon" is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch.Includes bibliographical references (pages 315-342) and index.
Subjects: Cyberterrorism.; Cyberterrorism; Internet and international relations.; Technology and international relations.; Internet in espionage.; Cyberspace; Hacking;
Available copies: 14 / Total copies: 14
unAPI

Cyberspies : the secret history of surveillance, hacking, and digital espionage / by Corera, Gordon,author.(CARDINAL)479445;
Includes bibliographical references (pages 393-420) and index.Birth -- Marriage -- Into the cold -- Coming of age -- Spy-hunting -- Crypto wars -- Attack -- Enter the KGB -- Out of the cold and into cyberspace -- Titan rain -- In the wires -- Britain and the cyber spies -- Dissent -- Sabotage -- The lights go off -- Rebirth: cables -- Britain -- Exposure -- Epilogue: To infinity and beyond.The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes us through the Cold War and the birth of the Internet to the present era of hackers and surveillance. The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Corera has gathered compelling stories from heads of state, hackers, and spies of all stripes into a groundbreaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.--Adapted from dust jacket.
Subjects: Computer crimes; Internet in espionage.; Data protection.; Computer networks;
Available copies: 3 / Total copies: 4
unAPI

Manipulated : inside the cyberwar to hijack elections and distort the truth / by Payton, Theresa,1966-author.(CARDINAL)399044;
Includes bibliographical references and index."Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow's attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake" videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late"--
Subjects: Elections; Espionage.; Disinformation; Internet in political campaigns.; Internet; Cyber intelligence (Computer security);
Available copies: 1 / Total copies: 1
unAPI

Manipulated : inside the cyberwar to hijack elections and distort the truth / by Payton, Theresa,1966-author.(CARDINAL)399044;
Includes bibliographical references and index."Stories from the Frontlines of the Global Cyberwar Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow's attacks, weaving a fascinating yet bone-chilling tale of Artificial Intelligent mutations carrying out attacks without human intervention, "deepfake" videos that look real to the naked eye, and chatbots that beget other chatbots. Finally, Payton offers readers telltale signs that their most fundamental beliefs are being meddled with and actions they can take or demand that corporations and elected officials must take before it is too late"--
Subjects: Elections; Espionage.; Disinformation; Internet in political campaigns.; Internet; Cyber intelligence (Computer security);
Available copies: 2 / Total copies: 2
unAPI

Cyber spying / by Olson, Elsie,author.(CARDINAL)754970;
In this title, readers will learn about the ever-changing world of cyber espionage, hacking, and social engineering. Both historical and modern cyber spying techniques are explored. Readers will also learn how to protect themselves online.--from Amazon.
Subjects: Instructional and educational works.; Espionage; Spies; Electronic surveillance; Security systems; Computer crimes; Internet in espionage;
Available copies: 1 / Total copies: 2
unAPI