Catalog Search Results
21) Cyberterrorism
Author
Pub. Date
2019.
Accelerated Reader
IL: MG - BL: 8.7 - AR Pts: 2
Description
A book for young readers about the concept of cyberterrorism, its consequences, and the future of computer use--
Author
Pub. Date
[2016]
Description
"The sitting chairman of the Homeland Security Committee, who receives daily intelligence about threats materializing against America, depicts in real time the hazards that [he believes] are closer than we realize. From cyberwarriors who can cripple the Eastern seaboard to radicalized Americans in league with Islamic jihadists to invisible biological warfare, many of the most pressing dangers are the ones [he feels] we've heard about the least--and...
Author
Pub. Date
2019.
Description
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than 2 minutes. From hacking into voting machines to more mundane, but no less serious problems, our democracy faces unprecedented tests from without and within. In Democracy In Danger, Braun, a veteran of 3 presidential campaigns and former...
Author
Series
Peter Rena and Randi Brooks volume 4
Pub. Date
[2021]
Description
Billionaire entrepreneur and President of the U.S., David Traynor calls upon ruthless DC fixers Peter Rena and Randi Brooks, who must help him salvage American politics while dealing with cyberattacks and a world on the cusp of enormous change.
25) Dissolution
Author
Series
The Wyoming Chronicles volume 1
Pub. Date
[2021]
Description
For anthropology graduate student Sam Delgado, headed to the wilds of Wyoming, this is his last chance to save his graduate career. He and his urban classmates see this as the adventure of a lifetime: They are going to horse-pack in the wilderness to map and test a high-altitude archaeological site. Until a cyber-attack collapses the American banking system, and an already fractured nation descends into anarchy and chaos. All credit frozen, Sam and...
26) Trojan horse
Author
Series
Description
"The US military is under cyberattack. Gizmo and invisible Six must discover who is behind this attack and the culprits' aim. But the mysterious hackers seem one step ahead of I-6 at every turn." -- Adapted from back cover.
Author
Series
Camp Valor novels volume 2
Pub. Date
2020.
Accelerated Reader
IL: UG - BL: 5.4 - AR Pts: 14
Description
When gamer Jalen dons a pair of VR goggles and plays an online video game, he is awarded points for kills. However, Jalen doesn't know that the cyberterrorist Encyte is behind the game and the kills are real--Jalen just killed fifty-three innocent people. Wyatt Brewer of Camp Valor is assigned to investigate and find evidence against Encyte and The Glowworm Gaming Network that he fought last summer when he was betrayed by his mentor, Sargent Halsey....
28) Cyber wars
Author
Series
Pub. Date
2018.
Accelerated Reader
IL: MG - BL: 7.8 - AR Pts: 1
Description
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace. Cyber Wars traces the outcomes of these efforts through eyewitness accounts, background information about conflicts, and question prompts that encourage critical thinking about the ways that technology affects world events.
30) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
Author
Pub. Date
2018.
Description
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away.
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate...
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate...
Author
Pub. Date
[2022]
Description
"It's the near future, and tens of thousands of species are going extinct every year. The loss is not total, though: the DNA sequences of many species are being digitized and uploaded to a global network of "biobanks," together with brain and body scans, recordings of behavior in the wild, microbiota profiles, and so forth, in the hope that the extinct victims of humanity's destructiveness might one day be resurrected. Then comes the day when the...
33) The ascendant
Author
Series
Garrett Reilly thrillers volume 1
Pub. Date
2014.
Description
An unlikely hero--a number savant named Garrett Reilly--races around the globe to avert total war.
Author
Pub. Date
2017.
Accelerated Reader
IL: MG - BL: 8.2 - AR Pts: 1
Description
Cyber technology and counterterrorism are a hot topic today, and this book details how criminals, terrorists, and enemy governments attempt to use technology against the United States. How can we counter this threat? What training is our military and government using to prevent and/or repel cyberattacks? Students will learn about the cyber warriors who protect our nation's information networks. Historical accounts include narrative about the codebreakers...
Author
Pub. Date
[2018]
Description
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Series
Tom Clancy's Net Force (Adult series) volume 11
Pub. Date
[2019]
Description
The number one threat to the nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven, and officially unnamed, Net Force's elite group of...
37) Code hunter
Pub. Date
2002
Description
America's best player is being pulled in the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's most wanted list, and is blackmailing him to take part in a real twisted plan of world destruction.
Series
Pub. Date
2019.
Description
"In this digital age, it is not only conventional weapons that are used to threaten and harm others. A new and terrifying avenue is cyberspace and ransomware. This malware encrypts a user's data and demands payment in exchange for unlocking the data. Such attacks are becoming more widespread: a 2017 cyber incident attacked more than 45,000 users in countries around the world. This anthology presents a collection of global perspectives on the topic...