Catalog Search Results
1) The fox
Author
Language
English
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
Mortality doctrine volume 3
Pub. Date
2015
Language
English
Formats
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Patrick McLanahan novels volume 21
Language
English
Formats
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Series
Language
English
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
Michael completed the Path. What he found at the end turned everything he'd ever known about his life completely upside down. The truth Michael discovered about Kaine is more complex than anticipated, and more terrifying. Kaine is a tangent, a computer program that has become sentient. Kaine's master plan will populate...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Publisher
Universal Studios Home Entertainment
Pub. Date
[2017]
Language
English
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Author
Publisher
Greyson Media
Pub. Date
[2015]
Language
English
Description
"With no money coming in, Jack's license to carry suspended, and no good job prospects on the horizon, Jack's got it tough. He thinks things are turning around when Alice gets a lucrative job setting up a home data network. That is, until he discovers it's for a handsome, jet-setting software tycoon. The 'boy billionaire,' as Jack begrudgingly refers to him, takes a liking to computer-savvy Alice. Jealous, Jack thinks life can't get any worse, but...
Author
Publisher
Bloomsbury Publishing
Pub. Date
2021
Language
English
Formats
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Author
Series
Publisher
G.P. Putnam's Sons
Pub. Date
[2022]
Language
English
Description
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers,...
Author
Series
A Jack Ryan Jr. novel volume 7
Publisher
G.P. Putnam's Sons
Pub. Date
[2017]
Language
English
Description
Former U.S. Senator Weston Rhodes is a defense contractor with an urgent problem. His company needs someone to look over the books of Dalfan Technologies, a Singapore company -- quickly. He turns to his old friend Gerry Hendley for help. Hendley Associates is one of the best financial analysis firms in the country and the cover for The Campus, a top-secret American intelligence agency. Rhodes asks for two specific analysts, Jack Ryan Jr., and Paul...
Author
Series
Pike Logan thrillers volume 17
Language
English
Formats
Description
"Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
Publisher
20th Century Fox Home Entertainment
Pub. Date
[2013]
Language
English
Description
New York City detective John McClane delivers old-school justice to a new breed of terrorists when a massive computer attack on the U.S. infrastructure threatens to shut down the entire country over Independence Day weekend.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request