Catalog Search Results
1) The prince
Author
Formats
Description
With a mix of both respectable and immoral advice, The Prince is a frank analysis on political power. Separated into four sections, The Prince is both a guide to obtain power and an explanation on the aspects that affect it. The first section discusses the types of principalities. According to Machiavelli, there are four different types-hereditary, mixed, new and ecclesiastical. While defining each type, Machiavelli also discusses the implications...
Author
Description
In June 2011, Julian Assange received an unusual visitor: the chairman of Google, Eric Schmidt, arrived from America at Ellingham Hall, the country residence in Norfolk, England where Assange was living under house arrest. For several hours the besieged leader of the world's most famous insurgent publishing organization and the billionaire head of the world's largest information empire locked horns. The two men debated the political problems faced...
Author
Description
In 2013, former National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking...
Author
Description
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle...
Author
Formats
Description
The wars of the future are already being fought today. The United States military currently views cyberspace as the "fifth domain" of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook...
Author
Description
"An engaging, alarming, and enlightening book, one that is certain to be among the most important books on surveillance in the twenty-first century." -Siva Vaidhyanathan, author of Antisocial Media
Never before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, "stop and frisk" tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors-surveillance has...
Author
Formats
Description
A former Secretary of Homeland Security examines our outdated laws regarding the protection of personal information, and the pressing need for change.
Nothing undermines our freedom more than losing control of information about ourselves. And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.
In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information,...
Author
Description
The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR. The book is crammed with advice, guidance and templates and also includes a copy of the full regulation text and the supporting recitals. Topics include:
• The Data Protection Officer
• Data Protection Policy
• Data Protection / Privacy Notices
• Data Protection Impact Assessments...
Author
Description
What is data privacy? Why is it important? How much is your data worth? What exactly is data? Why is data privacy constantly in the news? The world has changed into a data-centric environment. It is important to learn how you can fortify your data privacy.
Fortify Your Data Privacy takes a deep dive into the world of data privacy, and how data privacy pertains to you and your business as we engage with big tech giants Google, Amazon, and Facebook.
This...
10) The Successful Privacy Mindset: Proven Security Hacks and Tricks to Protect Yourself From Stalkers a
Author
Description
Do you want to take back your life and be more safe and secure?
Do you dream of having strong privacy online and in your everyday life?
This book will show you how.
The Successful Privacy Mindset is for anyone that has ever felt watched, ever felt that their privacy has been compromised or for anyone that has ever felt less than safe and secure. You deserve to feel safe at all times!
If you are a survivor of an assault, rape, mugging, stalker,...
Author
Description
Euthanasia emerged as a talking point for progressives and secularists in the West in the 1960s. Given that they simply appropriated (without anyone's permission) control of national and private broadcasters, newspapers and university faculties, it became, eo ipso, a matter of public controversy. Other modish enthusiasms of that period, sexual licentiousness and psychotropic drugs for example, have long been, abandoned, but the quest for legislative...
Author
Description
Inform yourself! Inform on your neighbor!
Follow Special Agent Christian White on a cheerfully creepy tour of declassified government surveillance documents. White probes the redacted (blacked-out) texts of the FBI's notorious Counterintelligence Programs, searching for the words erased in the name of the Freedom of Information Act.
Learn fun techniques for the infiltration of activist groups, how to earn benefits and a pension as an agent provocateur,...
Author
Description
With the transition to the information age, a large amount of personal data has begun to be collected through technology. Following the digital traces of users and recording their personal data through technology have made them vulnerable. Users whose every move is monitored through technology have lost their control over the data that everyone can access. This situation has revealed data security and privacy problems. This book, which is interdisciplinary,...
Author
Description
It's a basic human right to feel and be safe in your community where you live, work and play. But, few people know or understand everything it takes to make this possible. Safe City details the concerted effort and integration of new technology it takes to make communities safer for everyone.
From fire departments detecting fires within seconds with thermal imaging to police departments detecting gunfire immediately through gunshot detection sensors,...
Author
Description
In 1964, a book entitled The Invisible Government shocked Americans with its revelations of a growing world of intelligence agencies playing fast and loose around the planet, a secret government lodged inside the one they knew that even the president didn't fully control. Almost half a century later, everything about that "invisible government" has grown vastly larger, more disturbing, and far more visible. In his new book, Tom Engelhardt takes in...
18) To Walk the Dog
Author
Description
When Army veteran Joe O'Flaherty enters the civil service, he encounters many critters. Denied retirement, he is called upon by the president to "drain the swamp."
How will he accomplish that and not lose his own soul in the bargain?
Author
Description
A clear-eyed, timely investigation of the threat posed by Artificial Intelligence to individual freedom, social cohesion, and the democratic process-and a radical proposal on how to fight back.
In this sharp, urgent book, philosopher, psychoanalyst, and former resistance fighter Miguel Benasayag warns of the great danger posed by the growing role of big data and algorithms in deciding the contours of individual lives and the direction of the world....
Author
Description
Banned from Twitter! Banned from Facebook! Banned from YouTube! and now Banned from Amazon!-In this issue is more BANNED content!Q: How do you survive in the age of disinformation?A: By chronicling the truth!***Welcome to the post-truth world!In this age of disinformation, it is important to document the travesties of the oligarchs and puppet masters; the "Powers That Be".*This monthly publication is salty.It's for adults ONLY!If you can't handle...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request