Catalog Search Results
Author
Description
This book is an introduction to the worker-owned cooperative movement in the USA. It was first released in 2011, and now it includes 79 videos, all active when connected to the internet, most of them realized by the cooperators. They make the content less boring, more entertaining, and lively.There is a section on Electric cooperatives and their new role in bridging the rural divide to bring the internet to rural America, a significant issue for a...
Author
Description
Depuis le 25 mai 2018, le Règlement Général sur la Protection des Données (RGPD) protège les informations privées des citoyens. Ce manuel vise à éclairer et guider les organisations dans la compréhension et l'application de ce règlement.
RGPD, 4 lettres qui changent le quotidien des entreprises et des associations. Entré en application le 25 mai 2018, le Règlement Général sur la Protection des Données protège les informations privées...
Author
Description
With cellphones and similar devices everywhere, we are all engaged in one of the most incredible social experiments ever conceived in the history of mankind. Within this alarming experiment, our kids are becoming entrenched in an increasingly pornified culture. Pornography use among kids is now a major public health issue due to its far-reaching effects.
Because exposure to pornography is inevitable, it is necessary to prepare our kids for that exposure....
184) Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Formats
Description
Publisher's description: Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book,...
Author
Formats
Description
"The crime you'll never see coming. The people you'll never forget. A nineteen-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions. A veteran cybersecurity specialist has built a deep network of top-notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny...
Author
Formats
Description
In A Lie Too Big to Fail, longtime Kennedy researcher (of both JFK and RFK) Lisa Pease lays out, in meticulous detail, how witnesses with evidence of conspiracy were silenced by the Los Angeles Police Department; how evidence was deliberately altered and, in some instances, destroyed; and how the justice system and the media failed to present the truth of the case to the public. Pease reveals how the trial was essentially a sham, and how the prosecution...
Author
Formats
Description
In late 2014, Arundhati Roy, John Cusack, and Daniel Ellsberg traveled to Moscow to meet with NSA whistleblower Edward Snowden. The result was a series of essays and dialogues in which Roy and Cusack reflect on their conversations with Snowden. In these provocative and penetrating discussions, Roy and Cusack discuss the nature of the state, empire, and surveillance in an era of perpetual war, the meaning of flags and patriotism, the role of foundations...
Author
Description
Bruce Sterling delves into the world of high-tech crime and punishment in one of the first books to explore the cyberspace breaches that threaten national security. From the crash of AT&T's long-distance switching system to corporate cyberattacks, he investigates government and law enforcement efforts to break the back of America's electronic underground in the 1990s.
This edition features a new preface by the author that analyzes the sobering increase...
189) The Forever Prisoner: The Full and Searing Account of the CIA's Most Controversial Covert Program
Author
Description
Some argued it would save the U.S. after 9/11. Instead, the CIA's enhanced interrogation program came to be defined as American torture. The Forever Prisoner, a primary source for the recent HBO Max film directed by Academy Award winner Alex Gibney, exposes the full story behind the most divisive CIA operation in living memory.
Six months after 9/11, the CIA captured Abu Zubaydah and announced he was number three in Al Qaeda. Frantic to thwart a...
Author
Description
When the possibility of wiretapping first became known to Americans they were outraged. Now, in our post 9/11 world, it's accepted that corporations are vested with human rights, and government agencies and corporations use computers to monitor our private lives. David H. Price pulls back the curtain to reveal how the FBI and other government agencies have always functioned as the secret police of American capitalism up to today, where they luxuriate...
Author
Description
Technology is rapidly moving into our bodies," writes cyber expert Keenan, and this book gives a chilling look ahead into where that road may lead us on a one way trip to the total surrender of privacy and the commoditization of intimacy." Here is the definitive dissection of privacy-eroding and life-invading technologies, coming at you from governments, corporations, and the person next door. Take, for example, Girls Around Me": a Russian-made iPhone...
Author
Formats
Description
"Winner of the Best Information Science Book Award, Association for Information Science and Technology" "Winner of the McGannon Book Award, McGannon Center at Fordham University" "Winner of the Labor Tech Book Award, Labor Tech Research Network" Karen Levy is a faculty member in the Department of Information Science at Cornell University and associated faculty at Cornell Law School. She is a New America Fellow.
A behind-the-scenes look at how digital...
Author
Description
Discover the ultimate peace of mind with "The Concierge's Protection Guide: The Art of Safeguarding Through Safety and Security." This isn't just a guide – it's your personal concierge, providing you with the expertise and tools to navigate life's challenges with confidence. Whether you're at home, on the road, or online, this comprehensive resource empowers you to protect what matters most. From practical tips to expert insights, "The Concierge's...
Author
Description
A mesmerizing mix of Charles Bukowski, Hunter S. Thompson, and Philip K. Dick, Chameleo is a true account of what happened in a seedy Southern California town when an enthusiastic and unrepentant heroin addict named Dion Fuller sheltered a U.S. Marine who'd stolen night vision goggles and perhaps a few top secret files from a nearby military base.
Dion found himself arrested (under the ostensible auspices of The Patriot Act) for conspiring with...
Author
Description
Media reform plays an increasingly important role in the struggle for social justice. As battles are fought over the future of investigative journalism, media ownership, spectrum management, speech rights, broadband access, network neutrality, the surveillance apparatus, and digital literacy, what effective strategies can be used in the pursuit of effective media reform? Prepared by thirty-three scholars and activists from more than twenty-five countries,...
Author
Description
Have you ever thought you were being followed or watched? Have you ever needed to follow or observe someone and not be seen?
In the world of espionage, surveillance and surveillance detection are a way of life. It is the job of every CIA operations officer to make sure he or she is not under surveillance-that is, being followed to the commission of an "operational act." It is also the job of every CIA operations officer to surveil his own targets,...
Author
Description
A technology reporter's behind-the-scenes history of the device that has taken over our lives.
How have smartphones shaped the way we socialize and interact? Who tracks our actions, our preferences, our movements as recorded by our smartphones? These are just some of the questions that Elizabeth Woyke, a journalist who has covered the industry for Bloomberg Businessweek, Forbes, and MIT Technology Review, addresses in this book.
Including photos...
Author
Description
A foolproof guide both to lying and to detecting deception, The CIA Guide to Lying and Lie Detection will teach you how the pros can tell if and when somebody is lying.
People lie all the time. Studies show that the average American lies between six and twenty times a day. Most lies are of the "little white" variety or are meant to spare a person's feelings. But what about the big lies? What about the consequential ones? You have a right to know...
199) The Prince
Author
Formats
Description
With a mix of both respectable and immoral advice, The Prince is a frank analysis on political power. Separated into four sections, The Prince is both a guide to obtain power and an explanation on the aspects that affect it. The first section discusses the types of principalities. According to Machiavelli, there are four different types-hereditary, mixed, new and ecclesiastical. While defining each type, Machiavelli also discusses the implications...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request