151 records matched your query
05282aam a2200445Ii 4500 001 3A37F9D87DE911E984ED0E2C97128E48 003 SILO 005 20190524010021 007 ta 008 180522t20192019nyua b 001 0 eng d 020 $a 1642820830 020 $a 9781642820836 020 $a 1642820849 020 $a 9781642820843 035 $a (OCoLC)1036730060 040 $a YDX $b eng $e rda $c YDX $d BDX $d JHY $d OQX $d OCLCF $d MOU $d MLX $d SILO 050 00 $a HV6773 $b .H335 2019 082 04 $a 364.16/8 $2 23 245 00 $a Hacking and data privacy : $b how exposed are we? / $c edited by the New York Times editorial staff. 250 $a First edition. 264 1 $a New York, NY : $b New York Times Educational Publishing, $c 2019. 300 $a 223 pages : $b illustrations ; $c 24 cm. 490 1 $a Looking forward 504 $a Includes bibliographical references (pages 216-217) and index. 505 00 $t How democracy can survive Big Data / $t Breaching government security. $t Russia's D.N.C. hack was only the start - $r Colin Koopman. $t Hackers hit dozens of countries exploiting stolen N.S.A. tool / $r Nicole Perlroth and David E. Sanger -- $t Hackers hide cyberattacks in social media posts / $r Sheera Frenkel -- $t Using texts as lures, government spyware targets Mexican journalists and their families / $r Azam Ahmed and Nicole Perlroth -- $t He won praise for halting a global cyberattack. Then he was arrested / $r Daisuke Wakabayashi -- $t North Korean hackers stole U.S.-South Korean military plans, lawmaker says / $r Choe Sang-Hun -- $t The world once laughed at North Korean cyberpower. No more / $r David E. Sanger, David D. Kirkpatrick and Nicole Perlroth -- $t Security breach and spilled secrets have shaken the N.S.A. to its core / $r Scott Shane, Nicole Perlroth and David E. Sanger -- $t Lebanese intelligence turned targets' android phones into spy devices, researchers say / $r Nicole Perlroth -- $t The myth of the hacker-proof voting machine / $r Kim Zetter -- $t A cyberattack in Saudi Arabia had a deadly goal. Experts fear another try / $r Nicole Perlroth and Clifford Krauss -- $t Cyberattacks put Russian fingers on the switch at power plants, U.S.says / $r Nicole Perlroth and David E. Sanger -- $t Stealing corporate secrets. $t With ransomware, its pay and embolden perpetrators, or lose precious data / $r Mark Scott and Nicole Perlroth -- $t Why car companies are hiring computer security experts / $r Nicole Perlroth -- $t Electronic setups of driverless cars vulnerable to hackers / $r Nicole Perlroth -- $t A cyberattack 'the world isn't ready for' / $r Nicole Perlroth -- $t Mystery of motive for a ransomware attack : money, mayhem or a message? / $r Sheera Frenkel, Mark Scott and Paul Mozur -- $t Iranian hacker charged in HBO hacking that included 'Game of Thrones' script / $r Daniel Victor and Sheera Frenkel -- $t Uber hid 2016 breach, paying hackers to delte stoen data / $r Mike Isaac, Katie Benner and Sheera Frenkel -- $t When to report a cyberattack? For companies, that's still a dilemma / $r Craig A. Newman -- $t Our data, their data. $t The looming digital meltdown / $r Zeynep Tufekci -- $t Alexa, what happen to my car? / $r John R. Quain -- $t The latest data privacy debacle / $r Zeynep Tufekci -- $t Facebook's role in data misuse sets off storms on two continents / $r Matthew Rosenberg and Sheera Frenkel -- $t Facebook leaves its users' privacy vulnerable / $t by The New York Times -- $t Facebook's surveillance machine / $r Zeynep Tufecki -- $t How Facebook's data sharing went from feature to bug / $r Kevin Roose -- $t How researchers learned to use Facebook ' likes' to sway your thinking / $r Keith Collins and Gabriel J.X. Dance -- $t For many Facebook users, a 'last straw' that led them to quit / $r Tiffany Hsu -- $t How calls for privacy may upend business for Facebook and Google / $r David Streitfeld, Natasha Singer and Steven Erlanger -- $t Cambridge Analytica whistle-blower contends data-mining swung Brexit vote / $r Ellen Barry -- $t How to protect ourselves. $t Things you should do about the Equifax hack / $r Tim Herrera -- $t Making the lives of cybercriminals and spies harder online / $r Nicole Perlroth -- $t How Google's physical keys will protect your password / $r Brian X. Chen and Nicole Perlroth -- $t New Year's resolutions to protect your technology / $r Brian X. Chen -- $t What you need to do because of flaws in computer chips / $r Cade Metz and Brian X. Chen -- $t How to protect yourself from ransomware attacks / $r Brian X. Chen -- $t How to protect yourself (and your friends) on Facebook / $r Brian X. Chen -- $t How democracy can survive Big Data / $r Colin Koopman. 650 0 $a Hackers. $v Juvenile literature. 650 0 $a Computer crimes $v Juvenile literature. 650 0 $a Data protection $v Juvenile literature. 650 0 $a Privacy, Right of $v Juvenile literature. 650 7 $a Computer crimes $2 fast $0 (OCoLC)fst00872063 650 7 $a Data protection $2 fast $0 (OCoLC)fst00887958 650 7 $a Hackers. $2 fast $0 (OCoLC)fst00872150 650 7 $a Privacy, Right of $2 fast $0 (OCoLC)fst01077444 655 7 $a Juvenile works. $2 fast $0 (OCoLC)fst01411637 830 0 $a Looking forward (New York Times Educational Publishing) 941 $a 2 952 $l PNAX964 $d 20200829014623.0 952 $l HWAX074 $d 20190607010608.0 956 $a http://locator.silo.lib.ia.us/search.cgi?index_0=id&term_0=3A37F9D87DE911E984ED0E2C97128E48 994 $a Z0 $b IX2Initiate Another SILO Locator Search