Catalog Search Results
1) The fox
Author
Language
English
Description
"Former chief of British Secret Intelligence Adrian Weston gets a call in the night from the Prime Minister: the Pentagon, NSA, and CIA were hacked simultaneously. When the culprit is revealed to be a brilliant British teenager with no agenda, Weston has an idea: If he can do this to us, what can he do to our enemies?"--From the publisher's web site.
Author
Series
Mortality doctrine volume 2
Language
English
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
Author
Series
Mortality doctrine volume 1
Language
English
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--
Publisher
PBS Distribution
Pub. Date
[2016]
Language
English
Description
Thanks in part to the documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield, cyberspace. Nova examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race.
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Centenal cycle volume 3
Publisher
A Tom Doherty Associates Book
Pub. Date
2018.
Language
English
8) Trojan horse
Author
Publisher
Thomas Dunne Books/St. Martin's Press
Pub. Date
c2012
Language
English
Author
Language
English
Formats
Description
In 2015, Russian hackers tunneled into the computer systems of the Democratic National Committee, and the emails they stole may have changed the course of American democracy. That same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. American...
Author
Publisher
Simon & Schuster
Pub. Date
2016.
Language
English
Description
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information...
Author
Language
English
Formats
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
12) Digital winter
Author
Language
English
Description
When twenty-two-year-old savant Donny Elton, who can't tie his shoes, creates an evolving computer virus that knocks out satellites, power grids, and communication systems, the world is thrown back into a lifestyle it hasn't known for a hundred years.
13) Kill chain
Author
Series
Publisher
Harlequin Audio
Pub. Date
[2021]
Language
English
Description
Natasha Mori and Bryan Ferrago work for the Net Force Cyber Squad, an elite government agency created to lead the charge against America2s online enemies. They2ve traveled to Maine2s coast for a project to study extreme weather forecasting, and hopefully enjoy a little vacation. But someone from Natasha2s past has followed them and, as a hurricane approaches, sees a chance to take her out of commission permanently. A team of elite biotech-enhanced...
14) Cutting edge
Author
Series
Tom Clancy's Power Plays volume 6
Publisher
Berkley Books
Pub. Date
c2002
Language
English
15) Cyberterrorism
Series
Publisher
Greenhaven Publishing
Pub. Date
2022.
Language
English
Description
"Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Publisher
Threshold Editions
Pub. Date
2017.
Language
English
Description
"New York Times bestselling author and veteran Washington Times columnist Bill Gertz explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars"--
"New York Times bestselling author and veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don't know it. Covert...
Author
Pub. Date
2018.
Language
English
Description
"Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense expert P.W. Singer and Council on Foreign Relations fellow Emerson Brooking"--
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away.
Through the weaponization...
Through the weaponization...
20) Bounty: a novel
Author
Publisher
Ballantine Books
Pub. Date
[2016]
Language
English
Description
"Following a team of FBI agents striving to counter an untraceable web site and the elusive forces behind it, and tracking the real perils of cyber-saturation across the globe, this all-too-topical thriller explores what happens when pervasive corruption, widespread public unrest, and the shattering of any last illusions of privacy clash in a perfect storm outside the rule of law"--Provided by publisher.
In Interlibrary Loan
Didn't find what you need? Items not owned by Jackson County Oregon can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request