Search
Type
Format
Sort
Location
Audience

Smith, Jeremy N.

Summary: When she arrived at MIT in the 1990s, Alien wanted to study aerospace engineering, but she was soon drawn to the school's venerable tradition of high-risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead, two others were on trial, and two had been institutionalized. And Alien's adventures were only just beginning. After a stint at the storied, secretive...

Format: sound recording-nonmusical

Publisher / Publication Date: 2019

Copies Available at Woodmere

1 available in Compact Disc Audio Book, Call number: CD 921 ALIEN SMI

Summary: Most companies spend more money on coffee than they do on security, says Ralph Echemendia, lead instructor at Chicago's Hacker Academy. As this program demonstrates, such flagrant corporate carelessness is a gold mine for digital criminals. With disturbing insight into the hacker underworld, the program shows how crippling database invasions can be launched from almost any computer, grabbing...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD

Summary: Computer bugs are no mere prank. A disruption of global communications networks by today's sophisticated worms and viruses is costing companies billions and can do lasting damage to the world's economic health. This NewsHour program begins by defining these binary invaders and then examines the escalating security challenges of keeping networks free of infection. Members of the Computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: Some data thieves break into PCs electronically from remote locations, while others walk right in the front door during business hours. This program addresses the vulnerability of data stored on hard drives, on file servers, on removable media, and in computer memory, as well as of data passed over the Internet. Case studies of both large and small companies provide an opportunity for computer...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: In this Fred Friendly Seminar moderated by Harvard Law School's Arthur Miller, panelists such as U.S. Supreme Court Justice Stephen Breyer; Nadine Strossen, president of the ACLU; Jamie Gorelick, of the U.S. Department of Justice; Professor Stephen Carter, of Yale Law School; and others examine the fine balance between the power of the government and the rights of the individual in a fictional...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: Bouncing between Canada and the U.S., Sc@mmed exposes an urgent problem of global proportions: phishing, the illegal gathering of others' personal information online in order to steal all their money-and even their identities. Through the cautionary stories of two people who got burned, this program shows how cybercriminals use scam spam and spoof Web sites to trick people into willingly giving...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: How do advertisers get your telephone number or e-mail address? Do they have your social security number too? This timely video addresses your concerns about keeping personal information private. We hear from experts following this important issue and learn what steps we can take to safeguard our privacy. You will find out just how much information is already legally available to people who...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: What is spam? How do spammers get their unwanted offers into your in-box? And how can the flow of electronic junk mail be stopped? Filmed in news report style, this program explains how shady advertisers send spam and then presents proactive strategies for combating it: spam filters, blacklists and white lists, opt-in and opt-out protocols, anti-spam legislation with real teeth, and greater...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2006

View online at AVOD

Summary: The Internet offers vast possibilities for learning, making a living, and having fun-but it can also destroy reputations, empty bank accounts, and ruin lives. This program cautions students about potential hazards to their computers-not to mention their careers, finances, and futures-that exist online. Highlighting the importance of setting up a firewall and keeping one's operating system...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Compact and portable, digitized information is an attractive alternative to bulky books, analog media, and emulsion-based photographs-but can it stand the test of time? In this program, Stewart Brand, co-inventor of the TCP/IP Internet protocol, and others in the know assess the rapid proliferation of digitization; confront the alarming risk of massive data loss through technology obsolescence,...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: The consequences of lax Internet security are severe! Use Securing the Web to awaken your students to the very real dangers posed by online security threats. In this video, a couldn't-care-less computer user is transported into his PC where he learns firsthand about phishing and pharming, spyware and adware, viruses and Trojans, and denial-of-service attacks and zombie networks. Weapons in the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: Few think of it in these terms, but logging onto the Web can be like letting strangers walk into your living room. Hosted by Dan Rather, this program explores the very real dangers of the Internet through a number of eye-opening examples, including coverage of Operation Blue Ridge Thunder, a task force that patrols the Internet for pedophiles; the tragic story of Amy Boyer, a 21-year-old woman...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: Digital technology plays an increasingly significant-and, many believe, unethical and intrusive-role in the lives of Americans. This CNBC program examines the rapidly growing data-mining and surveillance industries and brings examples of dubious and hurtful information-sharing to light. Case studies include a man whose cell phone records were acquired by his former employer, a woman whose...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2008

View online at AVOD

Summary: With such widespread access to the Internet, how vulnerable to online sabotage are banks, government agencies, nuclear plants, utilities, and hospitals? This program examines the Internet's exponential growth and evaluates risks posed by groups and individuals bent on crime or terrorism. Experts from the FBI, the Pentagon, and private companies, and even a self-confessed hacker comment on the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2005

View online at AVOD

Summary: The tools required to fight Internet-based offenses must constantly evolve and adapt. Unfortunately, so do the criminals. This program examines several forms of cyber-crime and their impact on law enforcement, national security, the corporate world, and society at large. Taking a global approach, the film presents interviews with American and European experts on cyber-terrorism, identity theft,...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Summary: In today's information-starved and fear-driven society, surveillance technology seems to be deployed almost everywhere-and a surveillance mind-set is just as ubiquitous. This program introduces students to the concept of a "surveillance society" and shows how cutting-edge tools are being developed to identify, monitor, and track both people and objects. Viewers are empowered to explore the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2010

View online at AVOD

Summary: What harm could come from sitting leisurely at the computer, chatting with online pals? Unfortunately, many young people who spend hours in chat rooms or post sensitive information on the Internet have little or no idea of the risks involved. This program warns students about how vulnerable they are whenever they venture into the cyber realm-even when they think they're among "friends."...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2007

View online at AVOD

Summary: Can high-tech weapons and unmanned defense systems outsmart the world's leading terrorists-perhaps even stopping them before they attack? This program looks at innovations now being developed for battlefield use as well as surveillance and security purposes. Featured technologies include guns that shoot around corners, automated vehicles that can neutralize the enemy, robots that detect and...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2010

View online at AVOD

Summary: Nanotechnology will likely transform the security and surveillance industries in the near future. Governments, corporations, and even individuals may have highly sophisticated sensors and tracking apparatus at their disposal—keeping tabs on everyone from customers to potential terrorists to aging parents. In this Fred Friendly Seminar moderated by Peabody award-winning correspondent John...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2009

View online at AVOD

Perlroth, Nicole

Summary: Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the...

Format: text

Publisher / Publication Date: Bloomsbury Publishing 2020

Copies Available at Woodmere

1 available in Adult Non-fiction, Call number: 363.32 PER

Summary: With the advent of the Internet, data has become available worldwide at the click of a button-including sensitive personal data. What is the potential for misuse of this information, and can users be sure that sites visited for online shopping, banking, and social networking are storing it safely? This program examines the transmission, storage, and use of electronic information, with the...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2011

View online at AVOD

Summary: It's been more than two decades since the first PC virus hit the Internet, and what was once little more than an annoyance created by teen hackers and hobbyists has become a sophisticated tool for crime. In this TEDTalk, computer security expert Mikko Hypponen discusses the viruses that can scavenge credit card numbers and deplete bank accounts, and the international crime rings behind them. As...

Format: software, multimedia

Publisher / Publication Date: Films Media Group 2011

View online at AVOD

Summary: The incredible untold story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world. He is considered a hero by some, and a traitor by others.

Format: moving image

Publisher / Publication Date: Universal Pictures Home Entertainment 2016

Copies Available at Woodmere

1 available in Drama DVDs, Call number: DVD DRAMA SNO

Copies Available at Peninsula

1 available in Digital Video Disc, Call number: DVD SNO RATED R

Summary: With unprecedented access, this behind-the-scenes chronicle follows director Laura Poitras and journalist Glenn Greenwald's encounters with whistle-blower Edward Snowden in a hotel room in Hong Kong, as he hands over classified documents that provide evidence of mass indiscriminate and illegal invasions of privacy by the NSA.

Format: moving image

Publisher / Publication Date: Anchor Bay Entertainment 2015

Copies Available at Peninsula

1 available in Digital Video Disc, Call number: DVD CIT RATED R

Copies Available at Woodmere

2 available in Documentary DVDs, Call number: DVD DOC CIT

chat loading...
Back to Top