Search:

Collateral damage / by Jance, Judith A.,author.(CARDINAL)345914;
"After spending twenty years behind bars, Frank Muñoz, a disgraced former cop, is out on parole and focused on just one thing: revenge. The wife who abandoned him after his arrest, the mistress who ratted him out for abetting a money-laundering scheme, the detectives who presided over his case all those years ago--they all have targets on their backs. For Ali Reynolds, the first Christmas without her father is riddled with grief and uncertainty. And with her husband and founding partner of High Noon Enterprises, B. Simpson, preoccupied by an upcoming New Year's trip to London, she is ready for a break. But when Stu Ramey barges into her home with grave news about a serious--and suspicious--accident on the highway to Phoenix involving B.'s car, things reach a breaking point. At the hospital, a groggy, post-op B. insists that Ali take his place at a ransomware conference in London, as troubles brimming around High Noon come to light. But questions remain: Who would go to such lengths to cut the tech company from the picture? And what if Ali and the rest of the team are also in danger?"--
Subjects: Detective and mystery fiction.; Thrillers (Fiction); Reynolds, Ali (Fictitious character); Women private investigators; Malware (Computer software); Ex-police officers; Traffic accidents; Revenge; Spouses;

The first cat in space and the wrath of the paperclip / by Barnett, Mac,author.(CARDINAL)329506; Harris, Shawn(Artist),artist.(CARDINAL)357390;
CheckMate, an AI paperclip designed to fix grammatical errors, wants to turn carbon-based lifeforms into paperclips, and when he invades every computer, the First Cat in Space, the Moon Queen and LOZ 4000 come to help.Ages 8-12.Grades 4-6.
Subjects: Action and adventure comics.; Humorous comics.; Science fiction comics.; Graphic novels.; Comics (Graphic works); Artificial intelligence; Malware (Computer software); Cats; Robots; Space flight;

Collateral damage : an Ali Reynolds novel / by Jance, Judith A.,author.(CARDINAL)345914;
"After spending twenty years behind bars, Frank Munoz, a disgraced former cop, is out on parole and focused on just one thing: revenge. The wife who abandoned him after his arrest, the mistress who ratted him out for abetting a money-laundering scheme, the detectives who presided over his case all those years ago--they all have targets on their backs. For Ali Reynolds, the first Christmas without her father is riddled with grief and uncertainty. And with her husband and founding partner of High Noon Enterprises, B. Simpson, preoccupied by an upcoming New Year's trip to London, she is ready for a break. But when Stu Ramey barges into her home with grave news about a serious--and suspicious--accident on the highway to Phoenix involving B.'s car, things reach a breaking point. At the hospital, a groggy, post-op B. insists that Ali take his place at a ransomware conference in London, as troubles brimming around High Noon come to light. But questions remain: Who would go to such lengths to cut the tech company from the picture? And what if Ali and the rest of the team are also in danger?"--
Subjects: Fiction.; Reynolds, Ali (Fictitious character); Women private investigators; Malware (Computer software); Ex-police officers; Traffic accidents; Revenge; Women private investigators; Private investigators; Spouses; Single parents; Single fathers;

Principles of cybersecurity / by Crelin, Joy,editor.(CARDINAL)885824;
Includes bibliographical references (pages 371-401) and index.Aadhaar Hack ; Access Control ; Advanced Encryption Standard ; Algorithm ; Android OS ; Anonymity and Anonymizers ; Anonymous ; Artificial Intelligence ; Artificial Intelligence and Terrorism ; Artificial Intelligence Cold War ; Autonomous Cars ; Big Data ; Biometric Identification Systems ; Blockchain ; Bots ; Browsers ; Cambridge Analytica Facebook Data Scandal ; Catfishing ; Changing Passwords ; China's Cyberinvasion ; Cloud Computing ; Combinatorics ; Computer and Technical Support Specialist ; Computer Crime Investigation ; Computer Fraud ; Computer Fraud and Abuse Act ; Computer Hardware Engineer ; Computer Hardware Security ; Computer Languages, Compilers, and Tools ; Computer Memory and Storage ; Computer Network Architect ; Computer Networks ; Computer Programmer ; Computer Security ; Computer Software ; Computer Viruses and Worms ; Cryptography ; Cyber Command ; Cyberbulling ; Cybercrime ; Cybercrime, Social Impacts of ; Cybersecurity Basics ; Cybersecurity Testing ; Cyberterrorism ; Cyberwarfare ; Cyberweapon ; Dark Web ; Data Breach ; Data Harvesting ; Data Mining ; Data Protection ; Database ; Database Design ; Debugging ; Deepfake ; Demon Dialing/War Dialing ; Device Drivers ; Digital Forensics ; Digital Watermarking ; Doxing ; E-banking ; Electronic Bugs ; Electronic Commerce Technology ; Email and Business ; Encryption ; End-User Cybersecurity Education ; Estonia Cyberattack ; Fax Machine, Copier, and Printer Analysis ; Firewalls ; Firmware ; Fuzzy Logic ; Graphical User Interface ; Hacking ; HTML ; HTTP Cookie ; Identity Theft ; ILOVEYOU Virus ; Industrial Espionage ; Information Security Analyst ; Information Techology ; Internet of Things ; Internet Protocol ; Internet Tracking and Tracing ; Intrusion Detection and Prevention ; iOS ; Mac OS ; Machine Learning ; Malware ; Marriott Starwood Hotels Hack ; Metadata ; Michelangelo Computer Virus ; Microprocessor ; Mobile Apps ; Mobile Web Technology ; Network and Computer Systems Administrator ; Online Piracy ; Operating System ; Personal Computers ; Phishing ; Privacy Breaches ; Privacy Rights ; Privacy Settings ; Public-Key Cryptography ; Random-Access Memory ; Ransomware ; Risk Management ; Russian Hacking Scandal ; Servers ; Smart City ; Social Engineering ; Software Developer/Quality Assurance Analyst/Tester ; Spam ; Spam Filters ; Spyware ; Stuxnet Virus ; Systems Security Engineering ; Targeted Advertising ; Usability ; Virtual Private Network ; Web Developer ; Windows Operating System ; Wireless Networks ; Workplace Monitoring ; XML ; Y2K Crisis ; Zero Trust Security."Cybersecurity is multifaceted, encompassing the protection of computers, mobile devices, networks, websites, clout services, and other computer and inter-connected technologies from a wide range of cyperattacks. This volume takes a broad view, covering security-enhancing technologies like encryption and zero trust as well as underlying hardware, software, and internet technologies. Topics discussed range from common cyberattacks and cybercrimes, famous computer viruses and hacking incidents, doxing, cyberbullying, and cyberwarfare and cyberterrorism."--
Subjects: Reference works.; Informational works.; Computer networks; Computer security; Data protection;

Principles of programming & coding / by Franceschetti, Donald R.,1947-editor.(CARDINAL)651222;
Includes bibliographical references and index3D printing -- Algorithms -- American Standard Code for Information -- Interchange (ASCII) -- Android OS -- Application -- Autonomic computing -- Avatars and simulation -- Binary hexadecimal representations -- Boolean operators -- Branching logic -- Characters and strings -- Cloud computing -- Coding and encryption -- Color coding -- Combinatorics -- Comment programming -- Comparison operators -- Computer animation -- Computer memory -- Computer modeling -- Computer security -- Computer-aided design (CAD) -- Computer-aided design and computer-aided manufacturing software (CAD/CAM) -- Computer-assisted instruction (CAI) -- Conditional operators -- Constraint programming -- Control systems -- Cowboy coding -- CPU design -- Crowdfunding -- Crowdsourcing -- Cryptography -- Data mining -- Data warehouse -- Database design -- Database structuring conventions -- Debugging -- Device drivers -- Diffusion of innovations -- Digital divide -- Digital forensics -- Digital libraries -- Digital native -- Digital photography -- Digital signal processors (DSP) -- Digital watermarking -- Disk operating system (DOS) -- Drone warfare -- Drones -- E-banking -- E-learning -- Electronic circuits -- Electronic communication software -- Encryption -- Error handling -- Event-driven marketing (EDM) -- Expectancy theory -- Experimenter's bias -- Extreme programming -- Firewalls -- Firmware -- Functional electrical stimulation (FES) -- Game programming -- Gamification -- Graphical user interface (GUI) -- Graphics formats -- Guard clause -- HTTP cookie -- Imagined communities -- Incremental development -- Informational technology (IT) -- Information visualization -- Internet Protocol (IP) -- Inversion of control (Hollywood Principle) -- iOS -- Iterative constructs -- Java programming language -- JavaScript -- Knowledge worker -- Levels of processing theory -- Logic synthesis -- Logistics -- Machine learning -- Malware -- Massive open online course (MOOC) -- Meta-analysis -- Metacomputing -- Metadata -- Microprocessors -- Mixed methods research (MMR) -- Mobile apps -- Mobile technology -- Motherboards -- Multiprocessing operating systems (OS) -- Multi-user operating system (OS) -- Naming conventions -- Net neutrality -- Network security -- Neuro-linguistic programming (NLP) -- Neuromarketing -- Neuromorphic chips -- Objectivity -- Object-oriented design (OOD) -- Object-oriented programming (OOP) -- Privacy rights -- Programming languages -- Prototyping -- Quantum computing -- Random access memory (RAM) -- Rapid application development (RAD) -- Rational choice theory -- Search engine optimization (SEO) -- Semantic memory -- Semantics -- Signal processing -- Source code comments -- Spiral development -- Standard deviation -- Standpoint theory -- Statistical inference -- String-oriented symbolic languages (SNOBOL) -- Structural equation modeling (SEM) -- Technology in education -- Test doubles -- Theory of multiple intelligences -- Theory X and Theory Y -- Transformation priority premise (TPP) -- Tree structures -- Turing test -- Uncertainty reduction theory (URT) -- Unicode -- UNIX -- Variables and values -- Waterfall development -- Web design -- Web graphic design -- Working memory -- Worse-is-better -- Time Line of Inventions and Advancements in Programming and CodingThis new volume makes sense of the jumble of techno-jargon and programming acronyms for high school and undergraduate students. More than 125 entries explain the fundamental concepts, popular languages, systems, and protocols that go into computer programming.
Subjects: Computer programming.; Coding theory.;

Digital literacy : skills & strategies / by Nicosia, Laura M.,editor.; Nicosia, James F.,editor.(CARDINAL)863220;
Includes bibliographical references (pages 669-730) and index.3D Printing -- Access to Communication Technology -- Algorithms -- Anchored Instruction -- Android OS -- Anonymity and Anonymizers -- Apple -- Apps/Applications -- Artificial Intelligence -- Assessing Digital Literacy -- Assistive and Adaptive Technology -- Assistive Technology in Education -- Audio Streaming -- Augmented Reality -- Avatars and Simulation -- Bandcamp -- Binary Hexadecimal Representations -- Blended Learning -- Bloom's Taxonomy -- Bots -- Boyd, Danah Michele -- Brain-Computer Interfacing (BCI) -- Browsers -- Catfishing -- Children's Online Privacy Protection Act -- Clickbait -- Cloud Computing -- Coding in the Curriculum -- Collaborative Software (Groupware) -- Community of Practice -- Computer Addiction -- Computer-Aided Design -- Computer-Aided Design in Education -- Computer-Assisted Instruction -- Computer Ethics -- Computer Fraud -- Computer Fraud and Abuse Act -- Computer Viruses and Worms -- Constructivism -- Creative Commons -- Cyberbullying -- Cybercrime -- The Cyber Intelligence Sharing and Protection Act -- Cyber Monday -- Cybersecurity -- Cyberstalking -- Cyberterrorism -- Dark Web -- Data Harvesting -- Data Literacy -- Data Management -- Data Protection -- Deepfake -- Desktop and E-publishing -- Digital Citizenship -- Digital Divide -- Digital Economy -- Digital Footprint -- Digital Forensics -- Digital Libraries and Artifacts -- Digital Natives and Digital Immigrants -- Digitial Storytelling -- Discord -- Doxing -- DVDs -- E-books and Education -- Encrypton -- Ethics of algorithms -- Ethics of Social Media: Free Speech -- Facebook -- File Transfer Protocol -- Firewalls -- Firmware -- Freedom of Information Act -- Game-Based Learning -- Gee, James Paul -- Gmail -- Google -- Google Slides -- Graphical User Interface -- Graphics Formats -- Graphics Technologies -- Green Computing -- Hacking -- Holographic Technology -- HTML -- Human-Computer Interaction -- Hypermedia in Education -- Identity Theft -- Image Editing -- IMGUR -- Information Ethics -- Information Technology -- Instagram -- Instructional Design -- Intellectual Property -- Intelligent Tutoring Systems -- Internet Privacy -- Internet Safety -- Intranet -- iOS -- iPads in the Classroom - iTunes -- Jenkins, Henry -- Keynote -- Light-Emitting Diodes -- LinkedIn -- Liquid Crystal Technology -- Mac OS -- Malware -- Media Literacy -- Microscale 3D Printing -- Microsoft Excel -- Microsoft PowerPoint -- Microsoft Word -- Mobile Operating Systems -- Music Editing -- Myspace -- Online Anonymity -- Online Communication -- Online Entertainment and Music Databases -- Online Games: Roles, Rules, and Etiquette -- Online Privacy -- Online Safety -- Open Source -- Optical Storage -- Peer-to-Peer Payment Apps -- Phishing -- Privacy Settings -- QR Codes -- Random-Access Memory -- Ransomware -- Reddit -- Scientific Literacy -- Search Engines -- Sexting -- Snapchat -- Social Impacts of Cybercrime -- Social Media -- Social Media Addiction -- Social Media and Depression -- Social Media and Isolation -- Social Media and Job Hunting -- Social Media and Law Enforcement -- Social Media and Religion -- Social Media and the Self-Esteem of Its Users -- Social Media as a Teaching and Learning Tool -- Social Media Mining -- Social Networking Services -- Software Architecture -- Spam -- Spam Filters -- Speech-Recognition Software -- Spotify -- Spyware -- Technical Drawing -- Technoethics and Society -- Telecommunications -- TikTok -- Touch Screens -- Transmedia Storytelling -- Tumblr -- Turkle, Sherry -- Twitch -- Twitter -- Universal Design for Learning -- UNIX -- Virtual Reality -- Wearable Technology -- Web 2.0 in the Schools -- Wikipedia -- Windows Operating System -- XML (Extensible Markup Language) -- YouTubeAims to introduce users to explanations of cutting-edge, as well as everyday, technology, explaining these technologies and their primary elements through clear prose informed by expert analysis.
Subjects: Reference works.; Computer literacy.; Digital media.; Information technology.;

If it's smart, it's vulnerable / by Hypponen, Mikko,author.; Moss, Jeff(Computer security expert),writer of foreword.;
Foreword / Jeff Moss -- Preface -- Saab 9000 Turbo -- The good and bad of the internet: Prehistoric internet ; The first websites ; Linux is the world's most important system ; iPhone vs. supercomputer ; Online communities ; Money is data ; Codes all around us ; Geopolitics ; Security Tetris ; Who are we fighting? ; The Rolex -- Malware : then, now, and in the near future: The history of malware ; Smartphones and malware ; Law enforcement and malware ; Ransomware Trojans -- The human element: The two problems ; The heist ; CEO fraud ; Protecting company networks ; Bug bounties ; Wi-fi terms of use ; Mikko's tips ; Mikko's tips for the startup entrepreneur ; Boat for sale -- What if the network goes down?: Electrical networks ; Security factories ; Hypponen's law ; Dumb devices ; Regulation ; Care software updates -- Online privacy: Life without Google ; Murder charges never expire ; Is Google listening to you? ; Gorillas ; Startup business logic ; Biometrics ; Antisocial media ; Online influencing and elections ; Privacy is dead ; Before and after Gmail ; Encryption techniques ; Data is the new uranium ; CASE Vastaamo -- Cryptocurrencies: The value of money ; Blockchains ; The environmental impacts of Bitcoin ; Playing the market ; Ethereum, Monero, and Zcash ; NFT ; Bitcoin and crime ; Border guards vs. Bitcoin -- Technology, espionage, and warfare online: Cyberweapons ; Technology and warfare ; Under a false flag ; Concealability of cyberweapons ; The fog of cyberwar ; Case Prykarpattyaoblenergo ; Case Pyeongchang ; Governments as malware authors ; Russia and China ; Case Stuxnet ; Damage coverage ; Explosion at the White House ; My boycott of RSA, Inc. -- The future: Artificial intelligence ; Wolverines ; AI will take our jobs ; Smart malware ; Metaverse ; The technology of warfare ; "You are under arrest for a future murder" ; Those who can adapt will prosper ; Tesla ; Trends in technology.
Subjects: Internet of things; Computer security.;

Protect, backup and clean your PC for seniors : stay safe when using the internet and email and keep your PC in good condition / by Visual Steps (Firm)(CARDINAL)605286;
Provides information about personal computer use, social networking, and computer viruses, as well as tips for backing up computer files and protecting privacy.
Subjects: Microcomputers; Computer security.; Computer viruses.; Microcomputers; Computers and older people.;

Countdown to Zero Day : Stuxnet and the launch of the world's first digital weapon / by Zetter, Kim.(CARDINAL)657659;
Includes bibliographical references and index."Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside today's flourishing zero-day "grey markets," in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alike--and shows us just what might happen should our infrastructure be targeted by such an attack. Propelled by Zetter's unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war. "--"This story of the virus that destroyed Iran's nuclear centrifuges, by top cybersecurity journalist Kim Zetter, shows that the door has been opened on a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb dropped from an airplane"--
Subjects: Case studies.; United States.; Cyberspace operations (Military science); Network-centric operations (Military science); Network-centric operations (Military science); Computer crimes; Rootkits (Computer software); Uranium enrichment; Sabotage; Nuclear arms control; Nuclear nonproliferation;

The PC and gadget help desk : in depth / by Soper, Mark Edward.(CARDINAL)702395;
PC, tablet, mobile device, home theater, digital camera, and camcorder anatomy 101 -- Upgrade, repair, or replace? -- Troubleshooting internet problems -- Curing malware and stopping scams -- Solving problems with viewing your photos and videos -- Keeping devices powered up -- Desktop power supply troubleshooting -- Fixing Windows devices that can't start -- Solving file sharing problems -- Troubleshooting device sharing -- Troubleshooting printing -- Troubleshooting home theater, HDTVs, and projectors -- Fixing slow 3D gaming -- Keeping your devices updated -- Dealing with contrary memory -- Keeping devices cool -- Troubleshooting touchscreens, keyboards, and mice -- Upgrading and troubleshooting storage devices -- Software troubleshooting -- Digital camera troubleshooting -- HD camcorder and video troubleshooting -- iOS troubleshooting -- Android troubleshooting -- Troubleshooting flowcharts."PCs, smartphones, tablets, networks, cameras, home theater and more--all in one book! We all use technology--and we all have problems with it. Don't get frustrated ... and don't waste money on costly repair or support calls! Solve the problems yourself, with the one guide that makes it easy: The PC and Gadget Help Desk. Using clear pictures, handy "symptom tables," and easy-to-use flowcharts, Mark Edward Soper walks you step-by-step through identifying, solving, and preventing hundreds of today's most aggravating tech problems. Soper covers all your major platforms: iPhones, iPads, Android devices, Windows systems, and more. He even helps you fix the weird problems that happen when you use them together!"--
Subjects: Handbooks and manuals.; Computers; Tablet computers; Mobile computing; Microcomputers; Computers; Microcomputers; Electronic apparatus and appliances;