Catalog Search Results
1) The Circle
Author
Description
"The Circle is the exhilarating new novel from Dave Eggers, best-selling author of A Hologram for the King, a finalist for the National Book Award. When Mae Holland is hired to work for the Circle, the world's most powerful internet company, she feels she's been given the opportunity of a lifetime. The Circle, run out of a sprawling California campus, links users' personal emails, social media, banking, and purchasing with their universal operating...
Author
Formats
Description
Aspiring playwright, Kate Gamble, is struggling to launch a script she's been secretly researching her entire life, mostly at the family dinner table. Her father is Christian Gamble, CEO of Buck Technologies, a private data integration company whose clients include the CIA and virtually every counter-terrorism organization in the Western World. Kate's father adores her, and a play about the dark side of Big Data would be the ultimate betrayal in his...
Author
Formats
Description
As an eligible bachelor, man-about-town, and mover in the highest social echelons, Stone Barrington has always been the subject of interest and gossip. But when he's unwittingly thrust into the limelight, he finds himself scrambling to take cover. Before too long Stone's fending off pesky nuisances left and right, and making personal arrangements so surreptitiously it would take a covert operative to unearth them. Unfortunately, Stone soon discovers...
Description
Online and mobile technologies profoundly influence how we read, write, learn and work. Online behaviour follows us all through our schooling and careers. Explore skills for communicating smartly across many digital technologies, how multitasking affects learning and work and how online posts can become skeletons in a digital closet, causing school expulsions, destroying college admissions, and blowing job offers. Discover how to protect your privacy,...
6) Crosstalk
Author
Formats
Description
"In a not-too-distant future, a simple outpatient procedure that has been promised to increase empathy between romantic partners has become all the rage. So when Briddey Flannigan's fiancé proposes that he and Briddey undergo the procedure, she is delighted! Only the results aren't quite as expected. Instead of gaining an increased empathetic link with her fiancé Briddey finds herself hearing the actual thoughts of one of the nerdiest techs in her...
Description
Be prepared: Value of HIPAA risk assessment. A comprehensive security risk assessment is an important and necessary strategy for health care organizations to identify gaps in their privacy and security environments. While risk assessments alone do not directly mitigate data breaches, risk exposure decreases significantly when an organization knows exactly where protected health information (PHI) resides and how it is handled. We will cover reasons...
Author
Formats
Description
“Compelling and useful reading” for activists, protest groups, and individuals, from America’s leading constitutional rights group (Booklist).
In the age of terrorism and under the current administration, the United States has become a much more dangerous place—for activists and dissenters, whose First Amendment rights are all too frequently abridged by the government.
In...
In the age of terrorism and under the current administration, the United States has become a much more dangerous place—for activists and dissenters, whose First Amendment rights are all too frequently abridged by the government.
In...
Author
Formats
Description
"Sexting, cyberbullying, revenge porn, online predators... all of these potential threats can tempt parents to snatch the smartphone or tablet right out of their children's hands. While avoidance might eliminate the dangers, that approach also means your child misses out on technology's many benefits and opportunities. This book is packed with at-home discussion topics and enjoyable activities that any busy family can slip into their daily routine....
10) The dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Formats
Description
"Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...
Author
Description
"Who are you? You are data about data. You are a map of connections--a culmination of everything you have ever posted, searched, emailed, liked, and followed. In this groundbreaking work of narrative nonfiction, Kerry Howley investigates the curious implications of living in the age of the indelible. Howley's subjects face a challenge new to history: they are imprisoned by their past selves, trapped for as long as the Internet endures. A soap opera...
In JOS InterLibrary Loan
Didn't find what you need? Items not owned by VOKAL can be requested from other JOS InterLibrary Loan libraries to be delivered to your local library for pickup.
Make a purchase suggestion
Can't find what you are looking for? Try our Materials Request Service. Submit Request