Catalog Search Results
1) Count Zero
Author
Formats
Description
William Gibson continues the visionary Sprawl Trilogy that began with Neuromancer in this frighteningly probable parable of the future.
A corporate mercenary wakes in a reconstructed body, a beautiful woman by his side. Then Hosaka Corporation reactivates him, for a mission more dangerous than the one he’s recovering from: to get a defecting chief of R&D—and the biochip he’s perfected—out intact. But this...
A corporate mercenary wakes in a reconstructed body, a beautiful woman by his side. Then Hosaka Corporation reactivates him, for a mission more dangerous than the one he’s recovering from: to get a defecting chief of R&D—and the biochip he’s perfected—out intact. But this...
Description
Set in a futuristic Japan after the end of a brutal world war, science has advanced by leaps and bounds giving humanity the choice to prolong life and reduce suffering with the use of sophisticated cybernetics. With all of humanity linked into one system of minds and personalities known as ghosts, the biggest threat to civilization is the cyber terrorists capable of hijacking people's bodies and memories.
Author
Description
Proactive cyber security is the first step to protecting data and digital information from cybercriminals. It involves cyber security prevention measures such as establishing firewalls, setting up antivirus software, implementing two-factor authentication protections, and regularly backing up systems. By taking a proactive approach to cyber security, companies and individuals can protect themselves and other connected devices from malicious cyber...
Author
Description
This book depicts the basics of python which is very useful for beginners and those who are all willing to learn and coding in python. Nowadays python plays a major role in the industrial and programming environment, and most industries need python programmers to develop many applications like web development, mobile app development, etc., This book definitely helps for the age group of 10 to anyone., Easy examples are given in each and every chapter...
Author
Description
When her landlord raises the requirements for "social scores" necessary for her and her polyamorous partners to stay in their property, a desperate Kiera takes a job with hangdog, technophobic private eye Angel Herrera tracking down and exposing duplicitous lovers using her hacking skills. Then two bodies turn up with only two things tying them together: their connection to Kiera and a stick of Nag Champa incense left at the crime scenes. The unlikely...
Author
Description
Step into the future with "Internet Computer: Redefining Digital Boundaries," an enlightening and comprehensive guide that unravels the fabric of Internet Computer (ICP) - a groundbreaking technology that is reshaping the digital world as we know it.In the initial chapters, you will be introduced to the concept of Internet Computer, its origin, development, and why it matters in today's world.The book then provides a detailed overview of ICP technology,...
Author
Description
Do multiple versions of ourselves exist in parallel universes living out their lives in different timelines? In this follow up to his bestseller, The Simulation Hypothesis, MIT Computer Scientist and Silicon Valley Game Pioneer Rizwan Virk explores these topics from a new lens: that of simulation theory.
If we are living in a simulated universe, composed of information that is rendered around us, then many of the complexities and baffling characteristics...
9) Brothers
Author
Description
On October 22nd, 1982, at Sharei Tzedek Hospital, two babies are born at exactly the same time, one to a Jewish mother, the other to a Muslim woman. Amid the turmoil of that day, the hospital becomes the unwitting partner to a crime of passion, a crime involving the covert swap of the two babies. It isn't until 28 years later that a nurse, who was in the delivery room reveals the truth, triggering a series of happenings both tragic and profound. In...
Author
Description
"Springing from the febrile mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. This vision would radically transform the postwar world, ushering in sweeping cultural change. From the Cold War's monumental SAGE bomber defense system to enhanced humans, Wiener's scheme turned computers from machines of assured destruction into engines of...
Author
Description
Ce livre est un essai techno-philosophique qui vise à répondre aux questions suivantes : est-ce que les ordinateurs peuvent créer ? La création n'est-elle pas le fruit d'un processus de l'intelligence o l'on mélange des idées différentes permettant de créer une œuvre ou encore une machine nouvelle ? Alors, avec toutes les connaissances que l'on peut trouver sur le Web aujourd'hui, pourquoi un ordinateur n'est-il toujours pas capable d'inventer...
Author
Description
Discover How Algorithms Shape & Impact Our WorldNow you might look at this title and shy away, thinking that a book with "Algorithms" in its title must be just for techies and computer scientists. However this book is very accessible to those with no background in computer science.
Decisions Oftentimes Have Optimal Solutions Today, many decisions that could be made by human beings from predicting earthquakes to interpreting languages can now be...
13) Ciberguerra: La consolidación de un nuevo poder en las relaciones internacionales contemporáneas
Author
Description
El autor de esta obra sostiene que el ciberespacio puede considerarse como una nueva dimensión de acción humana para reproducir la guerra interestatal propia de las relaciones internacionales. Para su argumentación propone tres objetivos: primero, analizar la práctica de la guerra, sus elementos perennes y entender su relación con la tecnología, segundo, presentar las cualidades y los elementos que hacen del ciberespacio una nueva dimensión...
Author
Description
Effective cyber security strategy requires creating a culture of security awareness. As remote work and new technologies transform our digital landscape, security risks have multiplied. A comprehensive security awareness program is required to ensure everyone understands how to avoid risks.
This revised, expanded edition of “The Human Fix to Human Risk” guides you through building a security awareness program customized to your needs. The easy-to-use...
Author
Description
Three students discover a get-rich-quick scheme. Enough to get a special invitation from the government. Enough to get interest from several governments, with explosive consequences.
Secrets, shadowy fixers and mystery locations abound as the players mix with security forces in a game of cat and mouse.
Have you ever wished you could un-invent something?
Author
Description
���� Unveil the Secrets of Digital Security with "Cryptography and Computer Science" Bundle! ����
Are you ready to explore the thrilling world of cryptography and computer science? Dive into the depths of digital secrecy, protection, and innovation with our comprehensive book bundle, the "Cryptography and Computer Science: Design Manual for Algorithms, Codes, and Ciphers."
���� Book 1 - Introduction to Cryptography: A Beginner's...
Author
Description
Dans ce livre, plongez au cœur d'une exploration exhaustive des robots tueurs et de l'essor de l'intelligence artificielle dans la sphère militaire. De l'émergence des premières applications à l'impact sur la sécurité mondiale, ce livre offre un regard approfondi sur les avancées technologiques, les dilemmes éthiques, et les conséquences géopolitiques de cette révolution militaire. À travers des chapitres captivants, découvrez les débats...
Author
Description
Eres un adulto mayor o alguien que busca una guía fácil paso a paso? Entonces, ¡no busques más!
Si estás leyendo esto es porque tienes uno de los más recientes teléfonos insignia de Apple, y ahora que ya tienes esta belleza, es hora de darle buen uso a todo lo que te ofrece, usando un muy bien ilustrado manual de usuario que devela todos sus tips y trucos ocultos.
Esta guía ha sido elaborada de forma especial para darte exactamente lo que...
Author
Description
Internet a bouleversé nos habitudes et nos modes de vie. Et si la révolution numérique n'en était qu'à ses débuts? Et si, demain, nos achats en ligne, nos interactions sociales et nos loisirs s'inscrivaient dans une réalité virtuelle ultra connectée: le métavers?
Mais le métavers, c'est quoi? Verra-t-il le jour? Quelles seront les conséquences de son développement sur notre quotidien? Quels défis imposera-t-il à l’avenir? Maxime Samain,...
Author
Description
Everyone has to address and be aware of cyber security today; anybody or everything that accesses the Internet is a target.
Do you ever wonder how cyber security pertains to your daily life, what's at stake, and how you may particularly lock down your devices and digital traces to avoid being "Hacked"?
Do you operate a company, and are you now realizing how dangerous cyber-attacks are to your assets?
Do you want to learn how to rapidly establish...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request