The Locator -- [(title = "My car")]

151 records matched your query       


Record 17 | Previous Record | Long Display | Next Record
05282aam a2200445Ii 4500
001 3A37F9D87DE911E984ED0E2C97128E48
003 SILO
005 20190524010021
007 ta
008 180522t20192019nyua     b    001 0 eng d
020    $a 1642820830
020    $a 9781642820836
020    $a 1642820849
020    $a 9781642820843
035    $a (OCoLC)1036730060
040    $a YDX $b eng $e rda $c YDX $d BDX $d JHY $d OQX $d OCLCF $d MOU $d MLX $d SILO
050 00 $a HV6773 $b .H335 2019
082 04 $a 364.16/8 $2 23
245 00 $a Hacking and data privacy : $b how exposed are we? / $c edited by the New York Times editorial staff.
250    $a First edition.
264  1 $a New York, NY : $b New York Times Educational Publishing, $c 2019.
300    $a 223 pages : $b illustrations ; $c 24 cm.
490 1  $a Looking forward
504    $a Includes bibliographical references (pages 216-217) and index.
505 00 $t How democracy can survive Big Data / $t Breaching government security. $t Russia's D.N.C. hack was only the start - $r Colin Koopman. $t Hackers hit dozens of countries exploiting stolen N.S.A. tool / $r Nicole Perlroth and David E. Sanger -- $t Hackers hide cyberattacks in social media posts / $r Sheera Frenkel -- $t Using texts as lures, government spyware targets Mexican journalists and their families / $r Azam Ahmed and Nicole Perlroth -- $t He won praise for halting a global cyberattack. Then he was arrested / $r Daisuke Wakabayashi -- $t North Korean hackers stole U.S.-South Korean military plans, lawmaker says / $r Choe Sang-Hun -- $t The world once laughed at North Korean cyberpower. No more / $r David E. Sanger, David D. Kirkpatrick and Nicole Perlroth -- $t Security breach and spilled secrets have shaken the N.S.A. to its core / $r Scott Shane, Nicole Perlroth and David E. Sanger -- $t Lebanese intelligence turned targets' android phones into spy devices, researchers say / $r Nicole Perlroth -- $t The myth of the hacker-proof voting machine / $r Kim Zetter -- $t A cyberattack in Saudi Arabia had a deadly goal. Experts fear another try / $r Nicole Perlroth and Clifford Krauss -- $t Cyberattacks put Russian fingers on the switch at power plants, U.S.says / $r Nicole Perlroth and David E. Sanger -- $t Stealing corporate secrets. $t With ransomware, its pay and embolden perpetrators, or lose precious data / $r Mark Scott and Nicole Perlroth -- $t Why car companies are hiring computer security experts / $r Nicole Perlroth -- $t Electronic setups of driverless cars vulnerable to hackers / $r Nicole Perlroth -- $t A cyberattack 'the world isn't ready for' / $r Nicole Perlroth -- $t Mystery of motive for a ransomware attack : money, mayhem or a message? / $r Sheera Frenkel, Mark Scott and Paul Mozur -- $t Iranian hacker charged in HBO hacking that included 'Game of Thrones' script / $r Daniel Victor and Sheera Frenkel -- $t Uber hid 2016 breach, paying hackers to delte stoen data / $r Mike Isaac, Katie Benner and Sheera Frenkel -- $t When to report a cyberattack? For companies, that's still a dilemma / $r Craig A. Newman -- $t Our data, their data. $t The looming digital meltdown / $r Zeynep Tufekci -- $t Alexa, what happen to my car? / $r John R. Quain -- $t The latest data privacy debacle / $r Zeynep Tufekci -- $t Facebook's role in data misuse sets off storms on two continents / $r Matthew Rosenberg and Sheera Frenkel -- $t Facebook leaves its users' privacy vulnerable / $t by The New York Times -- $t Facebook's surveillance machine / $r Zeynep Tufecki -- $t How Facebook's data sharing went from feature to bug / $r Kevin Roose -- $t How researchers learned to use Facebook ' likes' to sway your thinking / $r Keith Collins and Gabriel J.X. Dance -- $t For many Facebook users, a 'last straw' that led them to quit / $r Tiffany Hsu -- $t How calls for privacy may upend business for Facebook and Google / $r David Streitfeld, Natasha Singer and Steven Erlanger -- $t Cambridge Analytica whistle-blower contends data-mining swung Brexit vote / $r Ellen Barry -- $t How to protect ourselves. $t Things you should do about the Equifax hack / $r Tim Herrera -- $t Making the lives of cybercriminals and spies harder online / $r Nicole Perlroth -- $t How Google's physical keys will protect your password / $r Brian X. Chen and Nicole Perlroth -- $t New Year's resolutions to protect your technology / $r Brian X. Chen -- $t What you need to do because of flaws in computer chips / $r Cade Metz and Brian X. Chen -- $t How to protect yourself from ransomware attacks / $r Brian X. Chen -- $t How to protect yourself (and your friends) on Facebook / $r Brian X. Chen -- $t How democracy can survive Big Data / $r Colin Koopman.
650  0 $a Hackers. $v Juvenile literature.
650  0 $a Computer crimes $v Juvenile literature.
650  0 $a Data protection $v Juvenile literature.
650  0 $a Privacy, Right of $v Juvenile literature.
650  7 $a Computer crimes $2 fast $0 (OCoLC)fst00872063
650  7 $a Data protection $2 fast $0 (OCoLC)fst00887958
650  7 $a Hackers. $2 fast $0 (OCoLC)fst00872150
650  7 $a Privacy, Right of $2 fast $0 (OCoLC)fst01077444
655  7 $a Juvenile works. $2 fast $0 (OCoLC)fst01411637
830  0 $a Looking forward (New York Times Educational Publishing)
941    $a 2
952    $l PNAX964 $d 20200829014623.0
952    $l HWAX074 $d 20190607010608.0
956    $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=3A37F9D87DE911E984ED0E2C97128E48
994    $a Z0 $b IX2

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.