First Title value, for Searching
by
Fazzini, Kate, author.
Format:
Books
Publisher
Oneworld,
Publication Date
2019
Shelf Number
364.168
Summary
Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone - an international corporation or a randomly selected individual. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers who create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. 'Kingdom of Lies' is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.
ISBN
9781786076373
First Title value, for Searching
by
Olson, Karen E., author.
Format:
Books
Publisher
Severn House Paperbacks,
Publication Date
2016 2015
Shelf Number
THR
Summary
Nicole Jones - if that is her real name - lives off the grid. She doesn't have a licence, passport or bank account. She definitely doesn't own a computer. She hasn't left her refuge, Block Island, in fifteen years. She's hidden from the world and she likes it that way. Nicole doesn't use a computer, not because she's afraid of it, but because she's afraid of what she - a badass hacker in her past life - would do with it. When the last person Nicole wants to see suddenly reappears, using a name he knows will draw her out, Nicole realises that her time hidden is now ending.
ISBN
9781847516367
View Other Search Results
First Title value, for Searching
by
Olson, Karen E., author.
Format:
Books
Publisher
Severn House,
Publication Date
2015
Shelf Number
THR
Summary
Nicole Jones - if that is her real name - lives off the grid. She doesn't have a licence, passport or bank account. She definitely doesn't own a computer. She hasn't left her refuge, Block Island, in fifteen years. She's hidden from the world and she likes it that way. Nicole doesn't use a computer, not because she's afraid of it, but because she's afraid of what she - a badass hacker in her past life - would do with it. When the last person Nicole wants to see suddenly reappears, using a name he knows will draw her out, Nicole realises that her time hidden is now ending.
ISBN
9780727885326
First Title value, for Searching
by
Fazzini, Kate, author.
Format:
Books
Publisher
Oneworld,
Publication Date
2020 2019
Shelf Number
364.168 CRI
Summary
Would you say your phone is safe, or your computer? What about your car? Or your bank? There is a global war going on and the next target could be anyone - an international corporation or a randomly selected individual. From cybercrime villages in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history and those committed to stopping them. You've never heard of them and you're not getting their real names. Kate Fazzini has met the hackers who create new cyberweapons, hack sports cars and develop ransomware capable of stopping international banks in their tracks. 'Kingdom of Lies' is a fast-paced look at technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.
ISBN
9781786078261
First Title value, for Searching
by
Warren, Peter, author.
Format:
Books
Publisher
Hodder Education,
Publication Date
2013
Shelf Number
364.168
Summary
Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage and cyber warfare now pose a major threat to society. After analysing the origins of computer crime among early hackers, the authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world - including all the communication services and utilities we have come to take for granted - has become utterly dependent on computers and the internet.
ISBN
9781444189988
First Title value, for Searching
by
McCarthy, Ava.
Format:
Books
Publisher
Clipper Large Print,
Publication Date
2010
Shelf Number
XX(641379.1)
Summary
Approached to crack a safe by the owner's suspicious wife, reformed hacker Henrietta 'Harry' Martinez can't resist the challenge. Now her client's absconded with a fortune in diamonds, leaving Harry as sole witness to a brutal murder - and she's also next in line for a ruthless assassin who doesn't like loose ends.
ISBN
9781407410142
First Title value, for Searching
by
Smith, Jeremy N., author.
Format:
Books
Publisher
Scribe,
Publication Date
2019
Shelf Number
B.ALI
Summary
The hacker now known as Alien entered MIT in 1998, intending to major in aerospace engineering. Almost immediately, she was recruited to join a secret student group scaling walls, breaking into buildings, pulling elaborate pranks, and exploring computer systems. Within a year, one of her hall mates was dead and two others were arraigned. And Alien's adventures were only beginning. This book is a whirlwind history of the last 20 years of hacking and cybersecurity. As Alien develops from teenage novice to international expert, she joins the secret vanguard of our digitised world, and reveals the forces at work behind our everyday technology.
ISBN
9781911617006
First Title value, for Searching
by
Coleman, E. Gabriella, 1973-, author.
Format:
Books
Publisher
Verso,
Publication Date
2015
Shelf Number
364.168 CRI
Summary
Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global collective just as some of its adherents were turning to political protest and disruption (before Anonymous shot to fame as a key player in the Arab Spring and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that some Anons claimed her as 'their scholar.' This book brims with detail from inside a mysterious subculture, including chats with imprisoned hacker Jeremy Hammond and the hacker who helped put him away, Hector 'Sabu' Monsegur.
ISBN
9781781689837
First Title value, for Searching
by
Moench, Doug.
Format:
Books
Publisher
DC Comics,
Publication Date
2003
Shelf Number
GRA
Summary
Using Hong Kong comic style, portrays Batman as he travels to Hong Kong in search of a killer and meets Benny Lo, the friend of the murder victim, changing Benny's view of the world and prompting his transformation into the Night Dragon.
ISBN
9781401201012
First Title value, for Searching
by
Larsson, Stieg, 1954-2004.
Format:
Books
Publisher
MacLehose,
Publication Date
2008
Shelf Number
XX(606649.14)
Series Title
The millennium trilogy ; v. 1
Summary
40 years ago, Harriet Vanger disappeared off the secluded island owned and inhabited by the powerful Vanger family. There was no corpse, no witnesses, no evidence. But her uncle, Henrik, is convinced that she was murdered by someone in her own family - the deeply dysfunctional Vanger clan.
ISBN
9781847245458
First Title value, for Searching
by
Larsson, Stieg, 1954-
Format:
Audio disc
Publisher
MacLehose,
Publication Date
2008
Shelf Number
XX(622812.3)
Summary
40 years ago, Harriet Vanger disappeared off the secluded island owned and inhabited by the powerful Vanger family. There was no corpse, no witnesses, no evidence. But her uncle, Henrik, is convinced that she was murdered by someone in her own family - the deeply dysfunctional Vanger clan.
ISBN
9781847246769
First Title value, for Searching
by
Engebretson, Pat (Patrick Henry), 1974- author.
Edition
Second edition / David Kennedy, technical editor.
Format:
Books
Publisher
Syngress,
Publication Date
2013
Shelf Number
005.8 SCI
Summary
An introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilise and interpret the results of modern day hacking tools which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more.
ISBN
9780124116443
Limit Search Results