Catalog Search Results
Join us for thoughtful discussions on thrilling true crime!
(Adults)
Wednesdays; Sept.11, Oct. 9, Nov. 13, Dec. 11; 7 p.m. at John and Judy Gay Library (JJGL) and Zoom
See Also:
Wednesdays; Sept. 4, Oct. 2, Nov. 13, Dec. 4; 12 p.m. at Hall
Pub. Date
[2017]
Language
English
Description
In this episode, Frankie Bridge meets up-and-coming TV star Zahida Allen who was immediately targeted by trolls when she shot to fame on Geordie Shore. While looking at the sheer volume of trolling she has endured, they notice one particularly aggressive troll who Zahida decides she’d like to confront. As the team search for Zahida’s troll, Frankie meets double gold-medal winning Olympic Swimming Superstar Rebecca Adlington, who despite being...
Series
Pub. Date
[2013], c2002
Language
English
Description
In the 21st century, "we are all becoming visible...in that other, parallel world of electronic records, databases, video films, and computer memories," says Professor David Canter. "Criminals who would've been hidden in the past are also becoming visible in this virtual world-provided we know how to look for them." In this program, Canter addresses the use of data mining to track the virtual and real-world movements of criminals. Case studies include...
Pub. Date
[2016]
Language
English
Description
What if there were "countries" the size of the average suburban household? What if they had their own rules, laws, and currencies? What if one of them almost brought the entire Internet to its knees? They're called data havens, and they are the Switzerlands of the Internet: bunkers, caves, and sea fortresses, offering cybercriminals and freedom fighters alike the privacy to conduct unregulated information exchanges, malware attacks, spam dumps, ransomware...
Pub. Date
[2015]
Language
English
Description
Thanks in part to the documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield - cyberspace. NOVA examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race.
Pub. Date
[2012], c2011
Language
English
Description
We'd like to think they're invincible, but America's power stations, water supplies, financial systems, and military communications are all vulnerable to attack. And the most pressing threat isn't from bombs or other physical dangers-it's from computer hacking. What can be done to protect our infrastructure and prevent a devastating digital assault? To find out, this CNBC Original documentary goes to the frontlines of the war on cybercrime and cyber-terrorism....
Series
Pub. Date
[2014]
Language
English
Description
The year 2013 was very bad for big business. In February $45 million was stolen from ATMs around the world after cyber criminals hacked credit cards and gave them unlimited withdrawal limits. Then, in November, 40 million credit card numbers were removed from the point-of-sale terminals of U.S. retailer Target. Ben Hammersley travels to New York and Washington D.C. to look at how crime has evolved, forensically examining the many ranks and roles of...
Author
Pub. Date
[2022]
Language
English
Description
"A propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, taking once-anonymous realms of money, drugs, and violence and holding them up to the light Black markets have always thrived in the shadows of society. Increasingly, these enterprises-drug dealing, money laundering, human trafficking, terrorist funding-have found their shadows online. Digital crime lords inhabiting lawless corners of the internet have operated...
Pub. Date
[2014]
Language
English
Description
There is new gold to be found on the internet, and possibly in your own computer. Secret backdoors, that do not have a digital lock yet, are being traded at astronomical amounts. In the cyber world trade, where there are no rules, you are in luck with "white-hat" hackers, who guard your online security. But their opponents, the "black-hat" hackers, have an interest in an unsecure internet, and sell security leaks to the highest bidder. They are the...
Author
Language
English
Description
As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power...
14) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Pub. Date
[2020]
Language
English
Description
This book is designed to provide the reader with the fundamental concepts of cybersecurity and cybercrime in an easy to understand, “self-teaching” format. It introduces all of the major subjects related to cybersecurity, including data security, threats and viruses, malicious software, firewalls and VPNs, security architecture and design, security policies, cyberlaw, cloud security, and more.
Pub. Date
[2012]
Language
English
Description
What's the secret to stopping crime? David Pogue gives the third degree to scientists pushing the limits of technology, not only to solve horrific murders but also to try to prevent crimes before they even happen. Pogue learns the latest techniques, from unraveling the clues embedded in a decomposing corpse, to detecting lies by peering directly into a suspect's brain, to tracking the creation of a criminal mind. And we meet a genius crime-stopper...
Author
Pub. Date
[2021]
Language
English
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Author
Pub. Date
[2018]
Language
English
Description
Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate,...
Author
Pub. Date
[2012]
Language
English
Description
Publisher's description: An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg.
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request