Catalog Search Results
Author
Description
Richard A. Clarke served as a national security official under presidents Bill Clinton and George W. Bush. Michael J. Morell is a former deputy director of the Central Intelligence Agency. Geoffrey R. Stone is the Edward H. Levi Distinguished Service Professor of Law at the University of Chicago Law School. Cass R. Sunstein is the Robert Walmsley University Professor at Harvard University. Peter Swire is the Nancy J. and Lawrence P. Huang Professor...
Author
Series
Formats
Description
Collect data and build trust.
With the rise of data science and machine learning, companies are awash in customer data and powerful new ways to gain insight from that data. But in the absence of regulation and clear guidelines from most federal or state governments, it's difficult for companies to understand what qualifies as reasonable use and then determine how to act in the best interest of their customers. How do they build, not erode, trust?
Customer...
Author
Formats
Description
"Protecting Your Internet Identity: Are you Naked Online? helps readers, young and old alike, understand the implications of their online personas and reputations. The authors offer a guide to the many pitfalls and risks of certain online activities and provide a roadmap to taking charge of your own online reputation for personal and professional success"--
"This book helps readers, young and old alike, understand the implications of their online...
Author
Description
In defining privacy as "the claim of individuals…to determine for themselves when, how and to what extent information about them is communicated," Alan Westin's 1967 classic Privacy and Freedom laid the philosophical groundwork for the current debates about technology and personal freedom, and is considered a foundational text in the field of privacy law. By arguing that citizens retained control over how their personal data was used, Westin redefined...
Author
Description
It's a basic human right to feel and be safe in your community where you live, work and play. But, few people know or understand everything it takes to make this possible. Safe City details the concerted effort and integration of new technology it takes to make communities safer for everyone.
From fire departments detecting fires within seconds with thermal imaging to police departments detecting gunfire immediately through gunshot detection sensors,...
Author
Description
The company calling us just discovered an anomaly on their most critical systems. Our job is to conduct a deep forensic analysis, perform threat assessment, and uncover all malware programs left by hackers.
Digital Forensics. We follow the attacker's footprint across a variety of systems and create an infection timeline to help us understand their motives. We go as deep as memory analysis, perfect disk copy, threat hunting and malware analysis while...
68) The Implant
Author
Description
Melinda Matthews, a freelance journalist, learns from a pharmaceutical company employee that a medical implant capsule designed and marketed by the company has features that violates a person's right to privacy. The whistleblower tells her that the device can not only track the implantee, but can also subliminally plant messages in their brains to influence their buying and political decisions. Melinda, becomes an advocate for digital privacy rights,...
69) Learn Social Engineering: Learn the art of human hacking with an internationally renowned expert
Author
Description
Improve information security by learning Social Engineering.
Key Features
Learn to implement information security using social engineering
Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on
Practical approach towards learning social engineering, for IT security
Book Description
This book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat...
Author
Description
A clear-eyed, timely investigation of the threat posed by Artificial Intelligence to individual freedom, social cohesion, and the democratic process-and a radical proposal on how to fight back.
In this sharp, urgent book, philosopher, psychoanalyst, and former resistance fighter Miguel Benasayag warns of the great danger posed by the growing role of big data and algorithms in deciding the contours of individual lives and the direction of the world....
Author
Description
Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical...
Author
Description
Banned from Twitter! Banned from Facebook! Banned from YouTube! and now Banned from Amazon!
-In this issue is more BANNED content!
Q: How do you survive in the age of disinformation?
A: By chronicling the truth! ***Welcome to the post-truth world!
In this age of disinformation, it is important to document the travesties of the oligarchs and puppet masters; the "Powers That Be." *This monthly publication is salty.
It's for adults ONLY! If you can't...
Author
Description
To create fear, distress and to disrupt the daily activities of another person through cyberstalking is a crime, if you are currently affected by cyberstalking, it is crucial that you alert the police to your situation to keep yourself safe. This practical guide offers an outline of the area of cyberstalking and cyber abuse. Written in an approachable way, it describes the forms of intrusions that have been identified by research and through the accounts...
74) To Walk the Dog
Author
Description
When Army veteran Joe O'Flaherty enters the civil service, he encounters many critters. Denied retirement, he is called upon by the president to "drain the swamp."
How will he accomplish that and not lose his own soul in the bargain?
Author
Description
Without a moment's pause, we share our most intimate thoughts with trillion-dollar tech companies. Their algorithms categorize us and jump to conclusions about who we are. They even shape our everyday thoughts and actions-from who we date to how we vote. But this is just the latest front in an age-old struggle.
Part history and part manifesto, Freedom to Think charts the history and importance of our most basic human right: freedom of thought. From...
Author
Description
If there is a section that most hacking books and blog posts currently disregard, it is the 'stay safe' section. In other words, they fail to detail the schemes and techniques a typical hacker (or activist) should use to guarantee a certain level of anonymity and safety. You may be the best hacker in the world, but if you cannot control your footprint on the internet and correctly erase your trail, you will simply crash and burn.
There are many books...
Author
Description
In the age of terrorism and under the current administration, the United States has become a much more dangerous place-for activists and dissenters, whose First Amendment rights are all too frequently abridged by the government.
In Hell No, the Center for Constitutional Rights, the country's leading public interest law organization, offers a timely report on government attacks on dissent and protest in the United States, along with a readable and...
Author
Description
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
This audiobook is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The audiobook starts...
Author
Formats
Description
Identity fraud happens to everyone. So what do you do when it's your turn?
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam filters, and those are good ideas as far as they go. But with the breaches of huge organizations like Target, AshleyMadison.com, JPMorgan Chase, Sony, Anthem, and even the US Office of Personnel Management, more than a billion...
Author
Formats
Description
Hailed as a masterwork of reporting and analysis, and based on decades of research within China, We Have Been Harmonized, by award-winning correspondent Kai Strittmatter, offers a groundbreaking look at how the internet and high tech have allowed China to create the largest and most effective surveillance state in history.
China's new drive for repression is being underpinned by unprecedented advances in technology: facial and voice recognition,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request