Search
Type
Format
Sort
Location
Audience

Chertoff, Michael

Summary: "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information...

Format: text

Publisher / Publication Date: Atlantic Monthly Press 2018

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 343 CHE

Citron, Danielle Keats

Summary: "The essential road map for understanding-and defending-your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights...

Format: text

Publisher / Publication Date: W.W. Norton & Company 2022

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 342.7308 CIT

Rosenzweig, Paul

Summary: A course of 24 lectures by Professor Paul Rosenzweig.

Format: moving image

Publisher / Publication Date: 2016

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 323.4482 SUR

Mitnick, Kevin D. (Kevin David)

Summary: "Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...

Format: text

Publisher / Publication Date: Little, Brown and Company 2017

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 005 MIT

Copies Available at Peninsula

1 available in Adult, Call number: 005.8 MIT

Kyi, Tanya Lloyd

1 hold on 1 copy

Summary: Explores the topic of surveillance, discussing how personal data is electronically captured and used by both public and private organizations.

Format: text

Publisher / Publication Date: Annick Press 2017

Sorry, no copies available

Place a hold to request this item.

Goodman, Marc.

Summary: An FBI futurist and senior advisor to Interpol analyzes the digital underground to reveal the alarming ways criminals, corporations and countries are using emerging technologies to target individuals and wage war.

Format: text

Publisher / Publication Date: Doubleday 2015

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 364 GOO

Perlroth, Nicole

Summary: Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the...

Format: text

Publisher / Publication Date: Bloomsbury Publishing 2020

Sorry, no copies available

Place a hold to request this item.

Véliz, Carissa

Summary: The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech...

Format: text

Publisher / Publication Date: Melville House 2021

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 005.8 VEL

Summary: With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2011

View online at AVOD

Corera, Gordon

Summary: Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.

Format: text

Publisher / Publication Date: 2016

Copies Available at Interlochen

1 available in Adult Non-fiction, Call number: Social Cult Corera

Summary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Back to Top