Search
Type
Format
Sort
Location
Audience

Chertoff, Michael

Summary: "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information...

Format: text

Publisher / Publication Date: Atlantic Monthly Press 2018

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 343 CHE

Hubbard, Ben

Summary: "In a growing digital world, how can you remain safe and secure? How can you protect yourself and your information? Learn all about your digital safety and security in this eye-opening book."--

Format: text

Publisher / Publication Date: Lerner Publications 2019

Copies Available at Peninsula

1 available in Juvenile, Call number: J343.73 HUB

Dudley, Renee

Summary: "The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--

Format: text

Publisher / Publication Date: Farrar, Straus and Giroux 2022

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 363.25 DUD

Copies Available at Peninsula

1 available in Adult, Call number: 363.25 DUD

Helberg, Jacob

1 hold on 1 copy

Summary: The author, who led Google's internal global product policy efforts to combat disinformation and foreign interference from 2016 to 2020, reveals that spoils of the ongoing cyberwar with certain countries are power over every meaningful aspect of our society.

Format: text

Publisher / Publication Date: Avid Reader Press 2021

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 327.10285 HEL

Mitnick, Kevin D. (Kevin David)

Summary: "Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...

Format: text

Publisher / Publication Date: Little, Brown and Company 2017

Copies Available at Peninsula

1 available in Adult, Call number: 005.8 MIT

Garon, Jon M.

Summary: "Reviews the broad landscape of legal and practical issues facing parents and adolescents when using smart phones and online technologies"--

Format: text

Publisher / Publication Date: Rowman & Littlefield 2022

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 004.67 GAR

Copies Available at Interlochen

1 available in Adult Non-fiction, Call number: Parent Garon

Shirow, Masamune.

Summary: "Deep into the 21st century, the line between man and machine has been inexorably blurred as humans rely on the enhancement of mechanical implants and robots are upgraded with human tissue. In this rapidly converging technoscape, the covert-ops agents of Section 9 are charged to track and crack the most dangerous terrorists, cybercriminals, and ghost hackers the digital future has to offer....

Format: text

Publisher / Publication Date: Dark Horse Manga 2008

Copies Available at Woodmere

1 available in Adult Graphic Novels, Call number: 741.5 GHO

Smith, Jeremy N.

Summary: When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school's venerable tradition of high-risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. And Alien's adventures were only just beginning. After a stint at the storied, secretive...

Format: sound recording-nonmusical

Publisher / Publication Date: 2019

Copies Available at Woodmere

1 available in Compact Disc Audio Book, Call number: CD 921 ALIEN SMI

Menn, Joseph

Summary: The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom -- even democracy itself.

Format: text

Publisher / Publication Date: PublicAffairs 2019

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 005.8 MEN

Shirow, Masamune.

Summary: "In a near future, technology has firmly taken root into society at large. Cybernetic implants are nothing uncommon and robots roam as plentiful as humans, all connected through their 'ghosts' to the electronic datastreams of the net. Major Motoko Kusanagi and the Public Security Section 9 find themselves in a constant battle with the newly created wave of technological terrorists and...

Format: text

Publisher / Publication Date: Kodansha Comics 2017

Copies Available at Woodmere

1 available in Adult Graphic Novels, Call number: 741.5 GHO

O'Neill, Eric

Summary: "A cybersecurity expert and former FBI "ghost" tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear...

Format: text

Publisher / Publication Date: Crown 2019

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 327.1247 ONE

Currie, Stephen

Summary: Discusses issues regarding the right to privacy and the impact of the internet, including information on identity theft, cyberbullying, secret data collection, hacking, and security breaches.

Format: text

Publisher / Publication Date: ReferencePoint Press 2014

Copies Available at Woodmere

1 available in Juvenile Nonfiction, Call number: J 004.67 CUR

Summary: Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious, and cybercriminals want it. From the sleuths who decoded the world's most advanced cyber weapon to scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge science, all to stay one step...

Format: moving image

Publisher / Publication Date: 2014

Copies Available at Woodmere

1 available in E-TV DVDs, Call number: DVD E-TV RIS

Summary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: In this Fred Friendly Seminar moderated by Harvard Law School's Arthur Miller, panelists such as U.S. Supreme Court Justice Stephen Breyer; Nadine Strossen, president of the ACLU; Jamie Gorelick, of the U.S. Department of Justice; Professor Stephen Carter, of Yale Law School; and others examine the fine balance between the power of the government and the rights of the individual in a fictional...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others' personal information online in order to steal all their money-and even their identities. Through the cautionary stories of two people who got burned, this program shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Most people learn traditional standards of behavior and respect for others by the time they are teenagers-but many don't realize that those rules are just as valid in cyberspace. This program helps students take the high road on the information superhighway and avoid the temptations of the fast lane, pointing the way toward an ethically sound Internet presence and lifestyle. Guidelines for the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Most companies spend more money on coffee than they do on security, says Ralph Echemendia, lead instructor at Chicago's Hacker Academy. As this program demonstrates, such flagrant corporate carelessness is a gold mine for digital criminals. With disturbing insight into the hacker underworld, the program shows how crippling database invasions can be launched from almost any computer, grabbing...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD

Summary: Computer bugs are no mere prank. A disruption of global communications networks by today's sophisticated worms and viruses is costing companies billions and can do lasting damage to the world's economic health. This NewsHour program begins by defining these binary invaders and then examines the escalating security challenges of keeping networks free of infection. Members of the Computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: Civil liberties advocates have warned against government surveillance for decades. Today, corporations use technology to monitor employees and customers. Is big business the new big brother? This program addresses the growing debate about our "surveillance society" and its erosion of privacy and anonymity-which could become casualties of the war for market supremacy as well as the war on...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Judee Sibbitt's company, AmberSAFE, uses GPS bracelets to track the whereabouts of children and seniors. In this program, Sue Abu-Hakima, co-founder and CEO of a wireless emergency notification system for schools and government agencies called Amika Mobile Corporation, and Peter Martin, a crisis management and risk assessment expert whose firm, AFI International Group, provides security for...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: Americans have grown used to being watched at ATMs, in lobbies, and even while driving. Now they are being tracked by satellite if they rent a car or make a cellular phone call and timed if they use an electronic pass to pay a toll. In this program, ABC News anchor Ted Koppel and correspondent John Donvan survey the increasing intrusion-real or perceived-of technology into Americans' privacy....

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

chat loading...
Back to Top