Catalog Search Results
Author
Description
"The near future. Tens of thousands of species are going extinct every year. And a whole industry has sprung up around their extinctions, to help us preserve the remnants, or perhaps just assuage our guilt. For instance, the biobanks: secure archives of DNA samples, from which lost organisms might someday be resurrected . . . But then, one day, it’s all gone. A mysterious cyber-attack hits every biobank simultaneously, wiping out the last traces...
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Mortality doctrine volume 2
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--Provided by publisher.
Author
Series
Mortality doctrine volume 3
Description
Michael must figure out who his friends are before he makes a last-ditch effort to stop Kaine from realizing his plan and achieving worldwide cyber domination.
Author
Formats
Description
"We live our lives - and conduct our business - online. To keep our data safe, we rely on passwords and encryption and private servers, IT departments and best practices. But there is a 70 perdent chance that your data is already compromised. Cybersecurity attacks have increased exponentially, but because they’re stealthy and often invisible, many underplay, ignore, or simply don’t realize the danger. By the time they discover a breach, most...
7) Ghost
Author
Series
Description
"A terrible threat from the depths of the dark net. A devastating betrayal at the heart of a covert strike force. A deadly pursuit across a digital battlefield. A ruthless terrorist fueled by revenge. As devastating attacks unfold across the globe, Marc Dane must call on all his skills and ingenuity to track down the mysterious figure behind it all - a faceless criminal known only as Madrigal"--Provided by publisher.
Author
Series
Don Riley novels volume 1
Description
A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III.
Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece-a computer virus that, once inserted into...
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
12) The eye of minds
Author
Series
Mortality doctrine volume 1
Description
"The VirtNet offers total mind and body immersion, and the more hacking skills you have, the more fun it is. Why bother following the rules when it’s so easy to break them? But some rules were made for a reason. Some technology is too dangerous to fool with. And one gamer has been doing exactly that, with murderous results. The government knows that to catch a hacker, you need a hacker. And they’ve been watching Michael. If he accepts their challenge,...
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Description
"Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask the Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became...
16) The minders
Author
Description
"In the 21st century, information is king. But computers can be hacked and files can be broken into--so a unique government initiative has been born. Five ordinary people have been selected to become Minders--the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure, the country’s most classified information has been taken offline and turned into genetic code implanted inside their heads. Together, the five...
17) The crash
Description
In the not so distant future, a team of white-collar criminals is enlisted by the federal government to thwart a cyber-attack that threatens to bankrupt the United States of America.
Author
Description
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
Author
Description
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations....
20) The fox
Author
Formats
Description
The #1 New York Times-bestselling master of international intrigue takes readers into the bleeding-edge world of technological espionage in a propulsive thriller that feels chillingly real.
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their...
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their...
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Suggest a Purchase