Catalog Search Results
Author
Formats
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
Author
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 15
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
5) Zero days
Author
Formats
Description
A deadly virus is threatening the world's computers. It's smart, fast, and developed by a group of elite hackers. It can break through the highest security, crippling any system within seconds. It's the ultimate cyber weapon. Nobody understands the mind of a hacker quite like Chuck Drayton. But he's gone offline, rocked with guilt after a failed operation cost innocent lives. When Chuck is called back into action, he soon gets caught in the perilous...
6) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Formats
Description
Computers have become enmeshed in almost every aspect of modern life. While this development has made our lives easier and more convenient, it also opens us up to all sorts of security risks. The dozen activities in this volume emphasize the importance of computer security and delve into the steps that both coders and ordinary users of technology can take to improve their computer security. Individual activities explore topics such as encryption,...
8) Sneakers
Pub. Date
2003.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
Author
Series
Formats
Description
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity...
10) Cyber wars
Author
Series
Accelerated Reader
IL: MG - BL: 7.8 - AR Pts: 1
Formats
Description
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace. Cyber Wars traces the outcomes of these efforts through eyewitness accounts, background information about conflicts, and question prompts that encourage critical thinking about the ways that technology affects world events.
11) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Pub. Date
2016.
Description
The National Cyber Intelligence Center (NCIC) of Colorado Springs is being developed in cooperation with the Governor's office along with a number of other partners. This collaboration is centered around three broad programmatic areas;1) a program to provide education to public leaders(Cyber Institute-CI), 2) a program to support research, education and training in cyber security(Cyber Research, Education and Training Center -CRETC) and 3) a program...
Author
Series
Pub. Date
2012.
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is...
Author
Formats
Description
A Bookish Must Read for 2019 An Amazon Best Book of the Month Featured on NBC's TODAY and Nightly News "Smith's writing style…is crisp as he charts the course of Alien's life in a series of vignettes from uncertain undergraduate to successful business owner. The structure works because Smith is a lively storyteller." -The New York Times Book Review "Amusing and cautionary tale."-WORLD Magazine "A fascinating look at hacking and...
Author
Formats
Description
Awakening from a dream with more than one hundred predictions about the future in his head, an unassuming Manhattan bassist becomes one of the world's most powerful men and hides his identity behind an online persona that is targeted by greedy corporations and dangerous enemies.
Author
Formats
Description
"Longlisted for the Airey Neave Book Prize, Airey Neave Trust" Amy Zegart is senior fellow at the Hoover Institution and the Freeman Spogli Institute for International Studies at Stanford University and a contributing writer at The Atlantic. Her books include Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton) and (with Condoleezza Rice) Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity. She lives in...
Author
Series
Aimee Leduc investigations volume 3
Formats
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
Author
Formats
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...