Catalog Search Results
Publisher
Distributed by New Video Group
Pub. Date
2003, c1995
Language
English
Description
"Filmmaker Melissa Hacker's mother, Ruth Morley (Academy Award nominated costume designer for The Miracle Worker), was one of the over 10,000 children who were saved in the Kindertransport movement during the Holocaust. On the eve of World War II, as millions of Jews were seeking refuge from Nazi persecution, country after country turned its back--all except for Great Britain who opened its doors to an unspecified number of Jewish children in danger....
Publisher
Music Box Films
Pub. Date
[2010]
Language
Swedish
Description
Forty years ago, Harriet Vanger disappeared from a family gathering on the island owned and inhabited by the powerful Vanger clan. Her body was never found and her beloved uncle is convinced she was murdered and that the killer is a member of his own tightly knit but dysfunctional family. He employs disgraced investigative journalist Mickael Blomkvist and the tattooed and troubled yet resourceful computer hacker Lisbeth Salander to investigate.
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used...
Publisher
Universal Studios Home Entertainment
Pub. Date
[2017]
Language
English
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Publisher
Walt Disney Home Video
Pub. Date
[2011]
Language
English
Description
A hacker is transported into a computer where he must fight for his life against the Master Control system. The hacker teams up with a bookkeeping program and his girlfriend to try to replace Master Control with Tron.
After a man who is entranced with video games suddenly finds himself transported into a computer, he must play the games inside and survive in order to find a way back to reality.
Author
Publisher
linkedin.com
Pub. Date
2019.
Language
English
Description
Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build...
7) WarGames
Publisher
MGM Home Entertainment
Pub. Date
1998
Language
English
Description
Young electronics wizard David Lightman unwittingly hooks into America's supersecret wargames computer and the world is suddenly threatened with nuclear annihilation.
Author
Publisher
linkedin.com
Pub. Date
2018.
Language
English
Description
Learn how to use Kali Linux for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration, and pivoting.
Kali Linux is the pen-testing professional's main tool, and includes many hundreds of modules for scanning, exploitation, payloads, and post exploitation. In this course you can learn how to use Kali for advanced pen testing, including stealthy testing, privilege escalation, tunneling and exfiltration,...
9) The Matrix
Publisher
Warner Home Video
Pub. Date
[1999]
Language
English
Appears on list
Description
In an anti-utopian future, the "real" world as we know it is nothing more than a computer construct, created by an all-powerful artificial intelligence. A small group of humans has found a way out of the construct, and are now fighting for the future of the human race.
A computer hacker discovers that reality is nothing more than an elaborate facade called the Matrix, created by super-intelligent robots that have enslaved mankind and are using their...
10) MI-5: Volume 2
Publisher
BBC Video
Pub. Date
2005.
Language
English
Description
The threat to national security increases and the need to thwart the activities of terrorists operating within the UK becomes more urgent.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request