Catalog Search Results
Series
I hate Suzie volume season 1
Publisher
Universal
Pub. Date
[2021]
Language
English
Description
Suzie Pickles, a star on the wane, has her whole life upended when her phone is hacked and a photo of her in an extremely compromising position is released for the whole world to see. This excruciatingly honest show follows the various stages of Suzie's trauma episode by episode, through Shock, Denial, Fear, Shame, Bargaining, Guilt, Anger, and Acceptance as Suzie and her best friend and manager Naomi try to hold her life, career, and marriage together...
Author
Series
Coleccion American Book Group - Informatica y Computacion volume Volumen 49
Publisher
American Book Group - Ra-Ma Editorial
Pub. Date
© 2014
Language
English
Description
El objetivo de este libro es introducir al lector en el mundo del pentesting web o hacking de páginas y aplicaciones web. (Description in English below).
Se centra en la seguridad de páginas web y el modo de mejorar los niveles de seguridad. Además, podrás conocer las diferentes técnicas de ataque de manera guiada contra aplicaciones web, así como las contramedidas para proteger tus recursos.
Author
Publisher
Ra-MA
Pub. Date
2020.
Language
Español
Description
"El objetivo de este libro es ayudar al lector a conocer Kali Linux, una gran suite de seguridad informatica (Description in English below).De una forma grafica y didactica el lector aprendera entre otras cosas:Que es Kali y como se instala, Como se configura el modo de persistencia, Cual es la mecanica para hacer una prueba de intrusion con Kali, Cuales son las herramientas mas utiles y como se utilizan, Como arrancar y utilizar Kali en modo forense...
Author
Series
Trident deception volume 7
Publisher
St. Martin's Press
Pub. Date
2024.
Language
English
Description
"A U.S. destroyer is torpedoed by an Iranian submarine and Captain Murray Wilson of the U.S.S. Michigan is flown to the Pentagon to meet with the Secretary of the Navy (SecNav). There, Wilson learns that the Iranian submarine is just a cover story. One of the United States' own fully automated unmanned underwater vehicles has gone rogue, its programing corrupted in some way. Murray is charged with hunting it down and taking it out before the virus...
Author
Language
English
Formats
Description
Ten months ago Allie Harper --smart, feisty, too broke to get her car fixed-- rescued Thomas Bennington III, a hot, blind, college professor from a crosswalk in her dicey Cleveland neighborhood. When Allie saved Tom and his groceries from traffic, she unwittingly retrieved his winning $550 million Mondo Mega Jackpot ticket. The payout steered the two of them into a wild dash from romance to mayhem and multiple murders. Nothing's changed. Sure,...
Author
Series
Language
English
Description
Late one night, journalist Mikael Blomkvist receives a phone call from a source claiming to have information vital to the United States. The source has been in contact with a young female superhacker -- a hacker resembling someone Blomkvist knows all too well. The implications are staggering. Blomkvist, in desperate need of a scoop for Millennium, turns to Salander for help. She, as usual, has her own agenda. The secret they are both chasing is at...
10) Survive the Dome
Author
Language
English
Description
"A high school junior teams up with a hacker during a police brutality protest to shut down a device that creates an impenetrable dome around Baltimore that is keeping the residents in and information from going out"--
Author
Language
English
Formats
Description
The utterly gripping story of the most outrageous case of cyber piracy prosecuted by the US Department of Justice. A former US Navy intelligence officer, David Locke Hall, was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want...
Author
Language
English
Formats
Description
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
Author
Language
English
Description
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations....
Author
Publisher
Suma De Letras
Pub. Date
©2020
Language
Español
Description
QUIZÁ NO CONOZCAS A TUS VECINOS TAN BIEN COMO CREÍAS. En un tranquilo barrio residencial de Nueva York, un barrio de calles arboladas y acogedoras familias, algunos hogares han recibido una nota anónima: Me resulta muy difícil escribir esta carta. Espero que no nos odie. Hace poco mi hijo entró en su casa cuando usted estaba fuera... Un chico ha estado curioseando en las viviendas y en los ordenadores de sus dueños. ¿Quién es y qué ha descubierto?...
15) Moving target
Author
Language
English
Description
Lance Tucker, an incarcerated juvenile offender doing time for hacking into the San Leandro School District's computer system, is severely burned one night in a lock-up rec room. The police say that he did it to himself, but B. Simpson, Ali Reynolds's fiancé and the man who helped put Lance in jail, feels obligated to investigate. Lance is famous for developing software that allows users to surf the web undetected. And that digital camouflage...
Author
Publisher
Crown Publishers
Pub. Date
[2018]
Language
English
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
17) Chaos on CatNet
Author
Series
Catnet volume 2
Publisher
Tor Teen
Pub. Date
2021.
Language
English
Description
"When a mysterious entity starts hacking into social networks and chat rooms to instigate paranoia and violence in the real world, it's up to Steph and her new friend, Nell, to find a way to stop it--with the help of their benevolent AI friend, CheshireCat."--
Author
Series
Publisher
St. Martin's Press
Pub. Date
2014.
Language
English
Description
"Dewey Andreas, former Delta and newly recruited intelligence agent, is sidelined after screwing up his last two operations. Still drowning in grief after the tragic murder of his fiancé, Dewey has seemingly lost his focus, his edge, and the confidence of his superiors. A high level Russian hacker, known only as Cloud, is believed to be routing large amounts of money to various Al Qaeda terror cells, and the mission is to capture and render harmless...
Author
Language
English
Formats
Description
"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request