Catalog Search Results
![Mad Science (K-5th Grade)](/files/original/imageMadScience_Spring2024_carousel.jpg)
Encourage curiosity and problem solving!
(K-5th Grade) at John and Judy Gay Library (JJGL)
1) Spam
Pub. Date
[2006], c2004
Language
English
Description
What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater cooperation between legitimate businesses, Internet and online...
Pub. Date
[2014], c2014
Language
English
Description
Every hour of every day, our digital interactions are being recorded and logged. We live in the age of big data, where the seemingly mundane information of our everyday existence has enormous value. With the help of expert data trackers, this revealing doc offers a comprehensive look at how governments and large companies keep tabs on us. It follows the information trail of an ordinary Australian family on a typical day.
Pub. Date
[2005], c2001
Language
English
Description
How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who know how to access it-even without your permission. Finally,...
Pub. Date
[2006], c2001
Language
English
Description
Americans have grown used to being watched at ATMs, in lobbies, and even while driving. Now they are being tracked by satellite if they rent a car or make a cellular phone call and timed if they use an electronic pass to pay a toll. In this program, ABC News anchor Ted Koppel and correspondent John Donvan survey the increasing intrusion-real or perceived-of technology into Americans' privacy. In order to look at the issue from two sides, Koppel is...
5) CyberSense
Series
Pub. Date
[2007], c2008
Language
English
Description
The Internet offers vast possibilities for learning, making a living, and having fun-but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers-not to mention their careers, finances, and futures-that exist online. Highlighting the importance of setting up a firewall and keeping one's operating system up-to-date, the program provides straightforward advice about...
Series
Language
English
Description
Moderated by Harvard Law School's Charles Nesson, this Fred Friendly Seminar focuses on the tension between the President and Congress during a policy crisis in the fictional European country of Nukraine, involving issues such as the power to wage war, conduct diplomacy, and operate in secrecy, as well as the media's responsibilities in matters of national security. Panelists include U.S. Supreme Court Justice Antonin Scalia; former Secretary of State...
Language
English
Description
For years, companies have used temporary employees to keep costs low, but with jobless numbers rising amidst a recession, starting an employment agency is risky business. In this program, Meighen Nehme, founder of The Job Shoppe, a Windsor, Ontario-based temp agency, faces a challenging economy and crosstown competition. Her business plan and decisions are critiqued by Arlene Dickinson, CEO of a national marketing communications firm, and Sylvie Hyndman,...
Author
Pub. Date
[2021]
Language
English
Description
"Experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Submit Request