Catalog Search Results
Author
Description
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our...
Author
Description
"Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer...
Author
Description
Mackenzie Cooper took her eyes off the road for just a moment but the resulting collision was enough to rob her not only of her beloved daughter but ultimately of her marriage, family, and friends—and thanks to the nonstop media coverage, even her privacy. Now she lives in Vermont under the name Maggie Reid, working as a makeup artist at a luxurious spa. Her only goal is to stay under the radar, and make it through her remaining probation. But...
Author
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Description
The Hate U Give meets Internment in this pulse-pounding thriller about an impenetrable dome around Baltimore that is keeping the residents in and information from going out during a city-wide protest.
Jamal Lawson just wanted to be a part of something. As an aspiring journalist, he packs up his camera and heads to Baltimore to document a rally protesting police brutality after another Black man is murdered.
But before
...6) Hush-hush
Author
Formats
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Description
Neighbors begin to turn on each other after a series of break-ins is followed by a murder --
It's a quiet suburb in upstate New York, until anonymous letters start to arrive. "My son broke into your home recently while you were out." Into their homes, and into their computers as well. Learning their secrets, and maybe sharing some of them, too. When a woman down the street is found murdered, the tension reaches the breaking point. Who killed her?...
Author
Formats
Description
"Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request