Catalog Search Results
41) Identity theft
Author
Description
Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft.
Author
Description
Publisher description for Invasion of privacy : a reference handbook / Kevin M. Keenan. Invasion of Privacy: A Reference Handbook, chronicles the most pressing privacy issues and dilemmas from around the world from the 17th century to today. Shocking accounts of government and corporate abuse liven discussions of controversial topics ranging from high-tech surveillance and the collection of personal data to bodily and sexual privacy. The Internet,...
Author
Description
"Val and Julie just want what's best for their kids, David and Sophie. So when teenage son David comes home one day asking for a Pilot, a new brain implant to help with school, they reluctantly agree. This is the future, after all. Soon, Julie feels mounting pressure at work to get a Pilot to keep pace with her colleagues, leaving Val and Sophie part of the shrinking minority of people without the device. Before long, the implications are clear, for...
Description
Grant Jeffery will reveal how secret spy satellites now listen in on every phone call you make, how powerful supercomputers are building secret files that contain everything on everyone, from age to the last groceries bought, and more.
"Insightful, scriptural and brilliant in his research and communication."--Cutting Edge
"A fascinating journey through the modern technologies and government activities that are paving the way towards the New World...
Author
Description
"From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. Using real life stories and his own consulting experience, J.J. Luna shows you legal methods for protecting yourself from information predators and how to secure your bank accounts, business dealings, computer files, and even your home address. In this third updated edition, there are...
50) Privacy
Description
Looks at all sides in several arguments concerning the right to privacy, including debates about the Patriot Act, traveler searches, national identity cards, and public video surveillance.
Author
Description
Be online without leaving a trace.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics...
Author
Description
"Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection, while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Theresa M. Payton and Theodore Claypoole skillfully introduce readers to the many ways we are "watched" and how to change behaviors and activities...
53) Privacy
Author
Description
You are under surveillance right now. Your cell phone provider tracks your location, your online and in-store purchasing patterns are recorded, Facebook can determine your sexual orientation without you ever mentioning it. Corporations use surveillance to manipulate the prices we're offered; governments use surveillance to discriminate, censor, and put people in danger worldwide. Schneier shows what we can do to reform our government surveillance...
Author
Description
Defining and valuing the right to privacy -- Unfortunately, everyone cannot be trusted to behave well if let alone -- Too much official invasion of privacy harms the public interest -- Civilized life requires the exchange of information to unfair advantage -- A free society depends on the right to learn and share information without undue secrecy -- There are things nobody else has a right to learn from a person who wishes to keep them private.
Author
Description
"Governments, businesses, and individuals all rely extensively on online communication and information but repeated news reports of online breaches do not inspire confidence in the online world. This is true in many areas including business. What information is collected, how it is used or misused, and how it can be protected are among the topics covered in this book"--From the publisher's web site.
Author
Description
Social networking has grown into a staple of modern society, but its continued evolution is becoming increasingly detrimental to our lives. Shifts in communication and privacy are affecting us more than we realize or understand. Terms of Service crystalizes this current moment in technology and contemplates its implications: the identity-validating pleasures and perils of online visibility; our newly adopted view of daily life through the lens of...
Author
Description
"Investigative reporter for The Guardian and bestselling author Glenn Greenwald, provides an in-depth look into the NSA scandal that has triggered a national debate over national security and information privacy. With further revelations from documents entrusted to Glenn Greenwald by Edward Snowden himself, this book explores the extraordinary cooperation between private industry and the NSA, and the far-reaching consequences of the government's surveillance...