Catalog Search Results
1) Snowden
Language
English
Description
The incredible untold story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world. He is considered a hero by some, and a traitor by others.
Language
English
Description
Enter the "completely captivating" world of Mr. Robot. Cyber-security engineer by day and vigilante hacker by night, Elliot finds himself at a crossroads when the mysterious leader of an underground hacker group recruits him to destroy the firm he is paid to protect. Compelled by his personal beliefs, Elliot struggles to resist the chance to take down the multinational CEOs he believes are running (and ruining) the world.
4) Hot seat
Language
English
Formats
Description
"IT expert Friar finds a hair-trigger bomb strapped to his desk chair. An unseen hacker orders him to steal digital funds online or have his daughter abducted. As a fearless bomb expert arrives on the scene, the hacker frames Friar as the bomber. The tension mounts as Friar races to clear his name and expose the real terrorist without getting himself blown to smithereens"--Container.
5) Zero days
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
6) Blackhat
Language
English
Description
A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta.
Language
English
Description
Cyber-security engineer Elliot Anderson, along with the titular character and fsociety, starts a revolution to change the world. Season four will pick up where the third season finale left off, delving into the pros and cons of Elliot hitting "send" on the email that could reverse Five/Nine.
8) Trust
Language
English
Description
When a young girl is assaulted by an older man she meets on the Internet, her family's bonds are ripped apart as her father searches across the country in an effort to track down her attacker and exact revenge.
Language
English
Formats
Description
WikiLeaks founder Julian Assange and his colleague Daniel Domscheit-Berg team up to become underground watchdogs of the very powerful. They create a platform that allows whistleblowers to anonymously leak covert data. But when Assange and Berg gain access to the biggest trove of confidential intelligence documents in U.S. history, they battle each other and a defining question of our time: what are the costs of keeping secrets in a free society, and...
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Language
English
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
14) Citizenfour
Language
English
Description
With unprecedented access, this gripping behind-the-scenes chronicle follows award winning director Laura Poitras and journalist Glenn Greenwald's remarkable encounters with whistle-blower Edward Snowden in a hotel room in Hong Kong, as he hands over classified documents that provide evidence of mass indiscriminate and illegal invasions of privacy by the NSA.
Language
English
Description
Ghost pain: "When cyborg hacker Motoko Kusanagi is hired to investigate a devastating bombing, she must fight her way through a maze of phantom memories to unlock her mysterious past and track down the evil mastermind behind the attacks"--Container.
Ghost whispers: "Witness the formation of the legendary Public Security Section 9. When a clandestine organization hacks every car in the city, Kusanagi recruits a lethal team of cyber operatives ......
17) Untraceable
Language
English
Description
Jennifer Marsh is an FBI secret service agent who gets caught up in a very personal and deadly cat-and-mouse game with a serial killer. The killer knows that people are drawn to the curious and the dark side of things. They will log onto an 'untraceable' website where the killer conducts violent and painful murders live on the internet. The more people who log on and enter the website, the quicker and more violently the victim dies.
18) The fifth estate
Language
English
Description
"Based on true events, ... [this movie] reveals the mission of WikiLeaks' rebel founder Julian Assange ... to expose fraud and corruption to the world"--Container.
19) Disconnect
Language
English
Description
A couple is drawn into a dangerous situation when their secrets are exposed online. A widowed ex-cop struggles to raise a mischievous son who cyber-bullies a classmate. An ambitious journalist sees a career-making story in a teen that performs on an adult-only site. They are strangers, neighbors and colleagues and their stories collide in this riveting dramatic thriller about ordinary people struggling to connect in today's wired world.
20) Track down
Language
English
Description
Based on the incredible true story of catching America's #1 computer outlaw Kevin Mitnick.
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request