Catalog Search Results
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Pub. Date
2016.
Description
The National Cyber Intelligence Center (NCIC) of Colorado Springs is being developed in cooperation with the Governor's office along with a number of other partners. This collaboration is centered around three broad programmatic areas;1) a program to provide education to public leaders(Cyber Institute-CI), 2) a program to support research, education and training in cyber security(Cyber Research, Education and Training Center -CRETC) and 3) a program...
Author
Series
Pub. Date
2012.
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is...
Author
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 15
Formats
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
Author
Series
Rocky Mountain courage volume 3
Pub. Date
2022.
Description
"Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. But when a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and protect her father's company. Diplomatic Security Service special...
Author
Series
Issue brief volume 20-08
Pub. Date
2020.
Description
This issue brief provides an overview of consumer data privacy, describes applicable federal laws, and summarizes recent state legislation proposed to strengthen consumer data privacy laws.
Author
Pub. Date
2020.
Description
As the situation regarding coronavirus (COVID-19) rapidly changes, unique cyber risks are emerging for government, businesses, and individuals. This memorandum provides an overview of cybersecurity, the current threat landscape as a result of COVID-19, and provides information about COVID-19 cybersecurity resources.
17) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Pub. Date
2018.
Description
Three initiatives integrate cyber security resources to protect Colorado elections: 1) Securing the statewide voter registration system; 2) Securing overseas and military ballot return with encryption; 3) Colorado threat information sharing and joint fusion center. These initiatives make Colorado one of the safest states to cast a ballot resulting in one of the highest voter turnout.
Author
Series
Pike Logan thrillers volume 17
Formats
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...