Catalog Search Results
Pub. Date
[2010]
Language
Swedish
Description
Forty years ago, Harriet Vanger disappeared from a family gathering on the island owned and inhabited by the powerful Vanger clan. Her body was never found and her beloved uncle is convinced she was murdered and that the killer is a member of his own tightly knit but dysfunctional family. He employs disgraced investigative journalist Mickael Blomkvist and the tattooed and troubled yet resourceful computer hacker Lisbeth Salander to investigate.
2) Tron: legacy
Pub. Date
2011.
Language
English
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
3) Hackers
Pub. Date
1998, 1995.
Language
English
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
Author
Pub. Date
[2018]
Language
English
Description
"This course is a complete guide to help you get up and running with your cybersecurity career. You will learn the key tenets and basics of ethical hacking and security penetration testing techniques. You will also explore professional networking and security topics, including an introduction to the world of white hat hacking, reconnaissance, Kali Linux, and exploitation. This course provides step-by-step real-life scenarios. You will see first hand...
Pub. Date
[2017]
Language
English
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
8) Blackhat
Pub. Date
[2015]
Language
English
Formats
Description
A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta.
Pub. Date
[2020]
Language
English
Description
Cyber-security engineer Elliot Anderson, along with the titular character and fsociety, starts a revolution to change the world. Season four will pick up where the third season finale left off, delving into the pros and cons of Elliot hitting 1send2 on the email that could reverse Five/Nine.
10) The net 2.0
Pub. Date
2006.
Language
English
Description
When computer programmer Hope Cassidy arrives in Istanbul to begin her new job, her life is thrown into chaos. Her credit cards no longer work, all of the money is gone from her bank account, and her identity is stolen. Now Hope has to use all her skills in order to steal back her name and unravel the mystery. Thanks to some help from a cab driver and flight attendant, she will be able to uncover the truth about what is happening to her. Can she take...
Author
Series
Pub. Date
2018.
Language
English
Description
"Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn...
Pub. Date
2022.
Language
English
Description
Ethical hackers and penetration testers need a very good toolbox to do their job efficiently. They would also need to learn step-by-step how to use the tools from this toolbox and that's exactly what this course delivers. In this course, we will demonstrate Sqlmap, which is the most powerful tool for automated SQL injection detection and exploitation. The course will also present Google Hacking and show you how it can be used to find security weaknesses...
Pub. Date
[2022]
Language
English
Description
Cybersecurity is the protection of computers and networks from information disclosure, theft, or damage to hardware and software, and the disruption or misdirection of the services provided. It is a practice of protecting systems, networks, and programs from digital attacks. The course begins with an overview of the core key principles of cybersecurity, including access control and the CIA triad. Learn about virtualization and installing the Kali...
Pub. Date
[2010]
Language
Swedish
Description
The final installment of Stieg Larsson's 'Millennium' trilogy. Lisbeth Salander is fighting for her life in more ways than one. In an intensive care unit and charged with three murders, she will have to not only prove her innocence, but also identify and denounce the same corrupt government institutions that nearly destroyed her life. Once upon a time, she was a victim. Now, Lisbeth Salander is fighting back.
16) Tron
Series
Language
English
Formats
Description
A hacker is transported into a computer where he must fight for his life against the Master Control system. The hacker teams up with a bookkeeping program and his girlfriend to try to replace Master Control with Tron.
Pub. Date
2023.
Language
English
Description
This course is designed for information security professionals who wish to take the Certified Ethical Hacker (CEH) exam and move on to a career as a professional pentester (or penetration tester). This course will teach you what you need to know to pass the CEH exam, and will also give you insight into the day-to-day workflow of a certified ethical hacker. Upon enrolling in this course, you will receive: 19+ Hours of HD Video Lessons on how to think...
Pub. Date
[2007]
Language
English
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the U.S. Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. As soon as John gets to Matt's apartment,...
19) The signal
Pub. Date
2014.
Language
English
Description
Nic, his girlfriend Haley and his buddy Jonah take a detour from an idyllic cross-country road trip when they are contacted by a mysterious hacker who has gained entry into MIT's most secretive networks. But after a rendezvous in an eerily isolated spot goes awry, Nic wakes to a living nightmare in an isolation unit. Interrogated by Dr. Wallace Damon, Nic soon realizes that the only way to decipher the past is to escape the present.
Pub. Date
[2016]
Language
English
Description
Enter the "completely captivating" world of Mr. Robot. Cyber-security engineer by day and vigilante hacker by night, Elliot finds himself at a crossroads when the mysterious leader of an underground hacker group recruits him to destroy the firm he is paid to protect. Compelled by his personal beliefs, Elliot struggles to resist the chance to take down the multinational CEOs he believes are running (and ruining) the world.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request