Chertoff, Michael
Summary: "Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information...
Format: text
Publisher / Publication Date: Atlantic Monthly Press 2018
Copies Available at Woodmere
1 available in Adult Non-fiction, Call number: 343 CHECitron, Danielle Keats
Summary: "The essential road map for understanding-and defending-your right to privacy in the twenty-first century. Privacy is disappearing. From our sex lives to our workout routines, the details of our lives once relegated to pen and paper have joined the slipstream of new technology. As a MacArthur fellow and distinguished professor of law at the University of Virginia, acclaimed civil rights...
Format: text
Publisher / Publication Date: W.W. Norton & Company 2022
Copies Available at Woodmere
1 available in Adult Non-fiction, Call number: 342.7308 CITRosenzweig, Paul
Summary: A course of 24 lectures by Professor Paul Rosenzweig.
Format: moving image
Publisher / Publication Date: 2016
Copies Available at Woodmere
1 available in Adult Non-fiction, Call number: 323.4482 SURMitnick, Kevin D. (Kevin David)
Summary: "Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he...
Format: text
Publisher / Publication Date: Little, Brown and Company 2017
Copies Available at Woodmere
1 available in Adult Non-fiction, Call number: 005 MITCopies Available at Peninsula
1 available in Adult, Call number: 005.8 MITKyi, Tanya Lloyd
Summary: Explores the topic of surveillance, discussing how personal data is electronically captured and used by both public and private organizations.
Format: text
Publisher / Publication Date: Annick Press 2017
Sorry, no copies available
Place a hold to request this item.Goodman, Marc.
Summary: An FBI futurist and senior advisor to Interpol analyzes the digital underground to reveal the alarming ways criminals, corporations and countries are using emerging technologies to target individuals and wage war.
Format: text
Publisher / Publication Date: Doubleday 2015
Copies Available at Woodmere
1 available in Adult Non-fiction, Call number: 364 GOOPerlroth, Nicole
Summary: Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the...
Format: text
Publisher / Publication Date: Bloomsbury Publishing 2020
Sorry, no copies available
Place a hold to request this item.Véliz, Carissa
Summary: The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech...
Format: text
Publisher / Publication Date: Melville House 2021
Copies Available at Woodmere
1 available in Adult Non-fiction, Call number: 005.8 VELSummary: With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2011
View online at AVOD
Corera, Gordon
Summary: Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
Format: text
Publisher / Publication Date: 2016
Copies Available at Interlochen
1 available in Adult Non-fiction, Call number: Social Cult CoreraSummary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...
Format: software, multimedia
Publisher / Publication Date: Films Media Group 2005