Search:

CRACK99 : the takedown of a $100 million Chinese software pirate / by Hall, David Locke,author.(CARDINAL)363087;
Includes bibliographical references (pages 291-304).
Subjects: Case studies.; Computer crimes; Hacking; Software piracy; Criminal investigation; National security;
Available copies: 1 / Total copies: 1
unAPI

Tron [videorecording] / by Boxleitner, Bruce,actor.(CARDINAL)530268; Bridges, Jeff,1949-actor.(CARDINAL)759402; Carlos, Wendy,composer.(CARDINAL)842456; Gourson, Jeff,film editor.(CARDINAL)848382; Hughes, Barnard,1915-2006,actor.; Kushner, Donald,film producer.; Lisberger, Steven,film director,screenwriter.(CARDINAL)779944; Logan, Bruce,cinematographer.; MacBird, Bonnie,screenwriter.(CARDINAL)353520; Morgan, Cindy,1954-actor.; Warner, David,1941-actor.; Buena Vista Home Entertainment (Firm),film distributor.(CARDINAL)340297; Walt Disney Productions,production company.(CARDINAL)140420; Walt Disney Studios Home Entertainment (Firm),publisher.(CARDINAL)561474;
Director of photography, Bruce Logan ; editing, Jeff Gourson ; music, Wendy Carlos ; songs, Journey.Jeff Bridges, Bruce Boxleitner, David Warner, Cindy Morgan, Barnard Hughes.// Dan Shor, Peter Jurasik, TonyStephano.When a brilliant video game maker named Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing.CHV rating: PG.Rating: PG; for some material may not be suitable for children.Blu-ray disc, regions A, B, C; 1080p High Definition (2.20:1); 5.1 DTS-HD MA, Dolby digital 5.1; requires Blu-ray disc player.DVD, region 1, NTSC, widescreen (2.20:1) presentation, enhanced for 16x9 televisions, Dolby digital 5.1.
Subjects: Fantasy films.; Feature films.; Fiction films.; Films for the hearing impaired.; Science fiction films.; Computer animation; Hackers; Shared virtual environments; Software piracy; Video arcades; Video games industry; Video games; Virtual reality;
Available copies: 0 / Total copies: 1
unAPI

CRACK99 : the takedown of a $100 million Chinese software pirate / by Hall, David Locke,author.(CARDINAL)363087;
Includes bibliographical references.The "story of the biggest software piracy case prosecuted by the U.S. Department of Justice"--Amazon.com.
Subjects: Case studies.; Computer crimes; Criminal investigation; Hacking; National security; Software piracy;
Available copies: 2 / Total copies: 2
unAPI

Coding for digital security / by Harris, Patricia,1943 October 17-author.(CARDINAL)426411;
Stop, thief! -- Avoiding identity theft -- Cybercrimes -- Internet of things -- Software piracy -- Digital defenders -- Protecting companies and the government -- A growing problem.In this book, readers will learn expert tips to make sure their passwords are secure and their log-in information is safe. They ll also learn more about the cyberwar that happens every day on the Internet as security experts and malicious hackers do battle. Topics include passwords, encryption, network security, and cyberterrorism. Readers will also learn about the power and importance of really, really big prime numbers. Diagrams and accessible text help make this the perfect guide to digital security readers will decode the secrets of this book and see if they can crack the security code embedded within.1000LAccelerated Reader AR
Subjects: Computer security;
Available copies: 1 / Total copies: 2
unAPI

Cyberspace and the law : your rights and duties in the on-line world / by Cavazos, Edward A.(CARDINAL)208702; Morin, Gavino.(CARDINAL)208703;
Includes bibliographical references (pages 123-128) and index.1. Defining cyberspace. A quick tour of cyberspace ; Activities in cyberspace ; The dimensions of cyberspace ; The future of cyberspace -- 2. Electronic privacy. Anonymity ; The privacy of electronic communications and the ECPA ; State privacy law ; Common law actions for invasion of privacy ; The great cryptography debate -- 3. The virtual marketplace: business transactions on the net. Electronic contracts ; Acceptable use policies and caller contracts ; Credit card transactions in cyberspace -- 4. Intellectual property in cyberspace: copyright law in a new world. A copyright primer ; Copyright in cyberspace ; Software ; Other copyright issues -- 5. Harmful and dangerous words and the First Amendment. The First Amendment in cyberspace ; Freedom of speech ; Freedom of the press -- 6. Adult material: drawing the line between the legal and illegal. An overview of adult materials and activities available in cyberspace ; Indecency vs. obscenity: classifying on-line adult materials and activities ; Significance of being deemed obscene ; Laws governing adult material ; Possession of obscene material ; Child pornography ; What does all this mean? -- 7. Cyber-crimes: pitfalls for the unwary traveler. The Computer Fraud and Abuse Act ; Credit card abuse laws ; Wire fraud ; The National Stolen Property Act ; Software piracy ; Obscenity and child pornography ; Computer viruses and other harmful software ; Electronic Communications Privacy Act ; State computer crime laws ; Are the authorities overzealous?Answers many of the legal questions asked by sysops and users of the Internet and bulletin board systems.Association of American Publishers PROSE Award, 1994.
Subjects: Telematics; Cyberspace;
Available copies: 1 / Total copies: 1
On-line resources: Suggest title for digitization;
unAPI

The dark side of the Internet : protecting yourself and your family from online criminals / by Bocij, Paul.(CARDINAL)395414;
Includes bibliographical references and index.Cyberterror and information warfare -- Cyberterror -- A digital Pearl Harbor? -- Information warfare -- Terrorist uses of technology -- Further information -- Cyberattacks -- Assessing the threat -- Safety and prevention -- Further information -- Malicious software -- Viruses, trojans, and worms -- Types of computer viruses -- How many viruses are there? -- The damage caused by viruses -- How viruses spread -- Who writes viruses? -- Why people write viruses -- Detecting viruses -- Dealing with viruses -- Choosing antivirus software -- Safety and prevention -- Virus hoaxes -- More about trojans -- Dealing with trojans -- Safety and prevention -- Further information -- Spyware and adware -- What is spyware? -- Adware -- Why create spyware? -- The extent of the problem -- Contracting spyware -- Dealing with spyware and adware -- Safety and prevention -- Further information -- Identity theft and fraud -- Identity theft -- What is identity theft? -- Identity theft and the internet -- The extent of the problem -- Identifying phishing e-mails -- Safety and prevention -- Further information -- E-mail fraud -- Advance fee frauds -- Foreign lotteries -- Nigerian 419 fraud -- Other e-mail frauds -- Safety and prevention -- Further information -- Auctions and other forms of fraud -- Auction fraud -- Safety and prevention -- Other online frauds -- Safety and prevention -- Further information -- Junk e-mail -- What is spam? -- The extent of the problem -- The cost of spam -- Why spam exists? -- Dealing with spam -- Safety and prevention -- Resources for dealing with spam -- Further information -- Intellectual property theft -- Software piracy -- Safety and prevention -- Music and movie piracy -- Further information -- Online relationships and deviance -- Cyberstalking -- What is cyberstalking? -- The extent of the problem -- Who are the cyberstalkers? -- Who is most at risk? -- New and emerging forms of cyberstalking -- Safety and prevention -- Further information -- Online relationships -- Social isolation -- White knights -- Hero syndrome -- Further information -- Deviant subcultures -- Cults and hate speech -- Deviant subcultures and addiction -- Safety and prevention -- Further information.
Subjects: Computer crimes.; Cyberterrorism.;
Available copies: 3 / Total copies: 3
unAPI

Cyber crime / by Gerdes, Louise I.,1953-(CARDINAL)273449;
Includes bibliographical references and index.Presents a series of essays with varying viewpoints on the subject of computer crime. Includes a list of organizations to contact.
Subjects: Computer crimes.;
Available copies: 1 / Total copies: 1
unAPI

Wizzywig : portrait of a serial hacker by Piskor, Ed.(CARDINAL)356608;
"They say What You See Is What You Get-- but Kevin "Boingthump" Phenicle could always see more than most people. In the world of phone phreaks, hackers, and scammers, he's a legend. His exploits are hotly debated: could he really get free long-distance calls by whistling into a pay phone? Did his video-game piracy scheme accidentally trigger the first computer virus? And did he really dodge the FBI by using their own wiretapping software against them? Is he even a real person? And if he's ever caught, what would happen to a geek like him in federal prison? Inspired by the incredible stories of real-life hackers, WIZZYWIG is the thrilling tale of a master manipulator-- his journey from precocious child scammer to federally wanted fugitive, and beyond. In a world transformed by social networks, data leaks, and digital uprisings, Ed Piskor's debut graphic novel reminds us how much power can rest in the hands of an audacious kid with a keyboard" -- from publisher's web site.
Subjects: Comics (Graphic works); Fiction.; Graphic novels.; Hackers; Long distance telephone service;
Available copies: 2 / Total copies: 3
unAPI

Intellectual property / by Peloso, Jennifer.(CARDINAL)667555;
Includes bibliographical references and index.
Subjects: Intellectual property;
Available copies: 1 / Total copies: 2
unAPI

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;
Available copies: 2 / Total copies: 2
unAPI