Catalog Search Results
1) Hackers
Author
Series
Language
English
Description
What are hackers? Are they good? Bad? What can we do to protect ourselves, businesses, and society against hackers? How can we control them? And should we try? Get the facts and make up your own mind on these and more questions with Hackers, part of the new What's the Issue? series.
Should states be allowed access to all communications? What level of privacy should an individual expect? Who owns the Internet? In this fascinating starting point...
2) Hackers
Author
Language
English
Description
"This is a threat." That's how Hackers, Swedish writer Aase Berg's seventh book of poetry, begins. Hackers is a furious, feminist book about wanting to "hack" the patriarchal system-both in the physically violent sense and in the sense of computer hacking. But Berg also reveals the 'hag' behind the 'hack,' channeling the non-compliant rage of Glenn-Close-as-bunny-boiler from Fatal Attraction. The world Berg "hags" back at is a world of sexist, capitalist,...
Physical Desc
1 videodisc (54 min.) : sound, color with black and white sequences ; 4 3/4 in.
Language
English
Description
Examines the physiological mechanisms underlying memory, the study of which has enabled scientists to explain and even control memory. Looks at the malleability of memory and the possible realities of implanting and erasing individual memories.
Author
Series
Language
English
Description
Cybercrime affects everyone-from individuals to companies, colleges and universities, government agencies, and the military. Annual damage from cybercrime is expected to cost the companies, government agencies, and individuals $6 trillion annually by 2021. A career as a professional hacker is the perfect choice for those who want to use their computer skills to fight cybercriminals. In this book, you'll learn about career paths for professional hackers,...
9) Mind Hackers
Author
Language
English
Description
Cole Cheetum would like nothing more than to quietly tinker in his lab on the Wildwood, NJ boardwalk. His past inventions and quirky personality have earned him a warm place in the heart of America's popular culture.
A disturbing personal incident and his insatiable curiosity take Cole out of the lab and into a high stakes mystery where he meets Jenna Leigh. She had been hiding behind an ordinary persona, but with Cole's help she decides to finally...
10) The time hackers
Author
Physical Desc
87 pages ; 22 cm
Language
English
Description
When someone uses futuristic technology to play pranks on twelve-year-old Dorso Clayman, he and his best friend set off on a supposedly impossible journey through space and time trying to stop the gamesters who are endangering the universe. Seventh-grader Dorso Clayman opens his locker door to find a dead body. Thirty seconds later it disappears. It's not the first bizarre thing that has appeared in his locker and then vanished. Something's going...
Author
Physical Desc
xiii, 348 pages ; 25 cm
Language
English
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies -- from drug manufacturing to...
Author
Language
English
Description
Fight Off Hackers: Learn Tips and Tricks on How to Beat Hackers to Protect Your Website Today!
Hackers – they are everywhere – so when you hear about them out on the web looking to wreak havoc on your WordPress website, it's not an exaggeration by any strength of the imagination. Your WordPress blog and every other website on the internet are at risk if some safety precautions are not put into place. If you have a WordPress blog you need to be...
14) Phantom wheel
Author
Series
Hackers volume 1
Physical Desc
409 pages ; 22 cm.
Language
English
Description
"A group of teenage hackers has been conned into creating the most devastating virus the world has ever seen, and now it's up to them to take down the shadowy corporation behind it before it's too late"--
Being recruited by the CIA to join a top-secret intelligence program should be the opportunity of a lifetime. For Issa, it's a shot at creating a new and better life for herself and her siblings. For Harper, it's a chance to bury the secrets of...
Author
Language
English
Description
A seasoned commander wanted dead or alive. Old and forgotten enemies. Do they still exist or are they a myth? In her long military career, Ramona Bisset has already battled dangerous aliens, unholy HiDimBes, and transdimensional monsters. In a parallel universe, she meets Suit, a Qeerav Engineer, who searches for superconductanium, a rare metal with wonderful technological properties. On New Atagan, Emperor Gluk fights hordes loyal to a billions-year-old...
Author
Language
English
Description
Trip Elix is the author of the new novel Extortionware. The novel exposes one of the darkest sides of the internet that is rarely discussed and often times considered to be a taboo topic. Hackers and cyber thieves make the nightly news but they are only part of the story. People who have read the book have a greater understanding of other vulnerabilities we all face in our daily lives in cyber space. The book is written in a way that even those without...
Author
Series
Language
Español
Description
Mara Turing recibe un misterioso mensaje cuando está a punto de iniciar sus vacaciones de verano en Nueva York: "Necesito tu ayuda". El enigmático llamamiento procede de su tío, miembro del peligroso grupo de hackers "Dirtee Loopers", que desapareció sin dejar rastro cuando ella tenía apenas cinco años, dejando en la joven un gran vacío que ha marcado su infancia.
El viaje para encontrar a su tío, Arnold Turing, llevará a Mara y a sus amigos...
Author
Language
English
Description
The world of hackers is complex. White hat hackers are hired to protect private information. But there are also black hat hackers who want to create chaos. Develop your expertise with expressions as you explore the secret world of computer hackers! Packed with factual information and high-interest content, this nonfiction math book uses real-world examples of problem solving to build students' math and reading skills. Let's Explore Math sidebars feature...
Author
Series
Language
English
Description
The world of hackers is complex. White hat hackers are hired to protect private information. But there are also black hat hackers who want to create chaos. Develop your expertise with expressions as you explore the secret world of computer hackers! Packed with factual information and high-interest content, this nonfiction math book uses real-world examples of problem solving to build students' math and reading skills. Let's Explore Math sidebars feature...
Author
Language
English
Description
The hackers operate in cyberspace, their messages and the ransom money bouncing between countries until their trail disappears off the grid in Eastern Europe. As National Defense Agency operative KD Thorne and her partner Jeffery Blunt track the hackers from dam to dam across the US, the hackers create a web of misinformation to conceal their identities and hide their stolen money. Can KD and Blunt cut through the subterfuge and lay a trap to catch...
Looking for an older book we don’t have?
Printed books not owned by Santa Fe Public Library that were released more than 6 months ago can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. Limit: 3 per calendar month.
Looking for a newer item we don’t have?
Suggest the library purchase a new book, DVD, audiobook, or music CD through your account. Limit: 30 active requests at a time. Submit Purchase Suggestion