Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Country Of Publication
    • Publisher
    • Source
    • Target Audience
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
976 result(s) for "Theft Fiction"
Sort by:
Train's trust : a Western story
\"Steven Train is a thief who knows a thing or two about how to handle a firearm. One day he's approached by another crook named John Rainier to go on a manhunt. Train is wary at first, but when Rainier tells him there's a huge payout, he decides to take on the job\"--Amazon.com.
How to own an identity
The first two books in this series \"Stealing the Network: How to Own the Box\" and \"Stealing the Network: How to Own a Continent\" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air. \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Stealing the Network: How to Own an Identity
The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Bad business
Lindy gets a surprise windfall that allows her to pay for her dream trip to the Arctic. The only problem is, the windfall is a mistake made by a confused old lady. Lindy knows that keeping the money is wrong, yet she does it anyway. But when she tells a schoolmate what she has done, she really starts paying for her bad deed.
The Eustace Diamonds
This is the third of Trollope's Pallister novels and one of his most compelling works. The plot centres on the fabulous necklace owned by the Eustace family, which the beautiful but ruthless opportunist Lizzie, claims as her own after she marries Sir Florian Eustace for his money and becomes his widow after only a few months. Lizzie plots to keep the necklace, while at the same time she spreads her net over several prospective new suitors, in order to entrap another husband to keep her in the manner to which she has so rapidly become accustomed. This novel is both a gripping detective story and a fascinating study of moral duplicity.
The fourth watcher : a Bangkok thriller
Seeking to retire and settle down with his girlfriend and newly adopted daughter, travel writer Poke Rafferty unexpectedly meets up with his long-lost father, who asks for his help in safeguarding a stolen cache of priceless rubies and forged identity papers.
Sinking suspicions
\"This third book in the Sadie Walela Mystery Series includes a diverse cast of characters weaving together a story of murder, thievery, and the toll of war on the human spirit. In her effort to restore balance to her neighbor's life, Sadie unravels much more than a murder\"-- Provided by publisher.
Artists or art thieves? media use, media messages, and public opinion about artificial intelligence image generators
This study investigates how patterns of media use and exposure to media messages are related to attitudes about artificial intelligence (AI) image generators. In doing so, it builds on theoretical accounts of media framing and public opinion about science and technology topics, including AI. The analyses draw on data from a survey of the US public ( N  = 1,035) that included an experimental manipulation of exposure to tweets framing AI image generators in terms of real art, artists’ concerns, artists’ outrage, or competing interpretations. The results show that technology news use and science fiction viewing predicted support for AI art but also predicted belief that AI image generators will take jobs and steal art styles from human artists. In addition, the experimental results demonstrate that exposure to specific media messages can influence these responses. The findings carry implications for understanding the future adoption, use, and regulation of AI image generators.