Catalog Search Results
Author
Pub. Date
2017.
Description
"A veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states--such as Russia, China, Iran, and North Korea--and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States....
42) The throwaways
Pub. Date
[2016]
Description
Rather then go to prison, a hacker begins working for the CIA, where he assembles his own team of misfits.
43) Total power
Author
Series
Mitch Rapp novels volume 19
Pub. Date
2020
Formats
Description
When an ISIS plot devastates America's power grid, Mitch Rapp and his CIA team race to find the responsible cyberterrorists to prevent the nation from succumbing to total collapse.
45) Escapology
Author
Pub. Date
2016.
Description
"Shock Pao is the best. In the virtual world the Slip there's nothing he can't steal for the right price. Outside the Slip, though, he's a Fail - no degree, no job. So when his ex offers him a job, breaking into a corporate databank, he accepts--it's either that, or find himself a nice bench to sleep under. Amiga works for psychotic crime lord Twist Calhoun so when Shock's war comes to her, it's her job to bring him to Twist, dead or alive."--Amazon.com...
46) Cyberwarfare
Series
Pub. Date
[2018]
Description
There is warfare, and there is cyberwarfare. In today's technologically-driven world, governments, and even terrorist groups and hacktivists, engage in cyberwarfare to attack or disrupt the operations of other nations and organizations. Recent revelations about cyberattacks that threatened individual and national security have caused ripples of concern and outrage, but tend to die down quickly. How safe are we, and do we take security for granted?...
Author
Series
Tom Clancy's Power Plays volume 6
Formats
Description
Africa has become the battleground of a 21st-century war. As fiber-optic cable is laid down around the continent, UpLink Communications, headed by Roger Gordian, battles for control against his nemesis, Harlan DeVane, who trades in black-market commodities with terrorists and rogue states. DeVane kidnaps Gordian's daughter to ensure his success. Now Gordian must trust his UpLink team as never before.
48) Terms of use
Author
Pub. Date
[2015]
Description
Circles is the most popular social network in the world: vast, ubiquitous, and constantly evolving. Days before expanding into China, Circles suffers a devastating cyberattack--and a key executive is brutally murdered. As he fights to save the company he helped build, top engineer Sergio Mansour uncovers evidence of a massive conspiracy that turns the power of Circles against its users. But as Sergio investigates, someone is watching his every move--someone...
50) The minders
Author
Pub. Date
2021.
Description
"The new high concept thriller from the author of The Passengers and the word-of-mouth sensation The One, soon to be a Netflix original series. In the 21st century, information is king. But computers can be hacked and files can be broken into - so a unique government initiative has been born. Five ordinary people have been selected to become "minders" - the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure,...
Author
Pub. Date
[2018]
Description
When he stepped down in January 2017 as the fourth United States Director of National Intelligence, James Clapper had been President Obama's senior intelligence adviser for six and a half years, longer than his three predecessors combined. He led the U.S. intelligence community through a period that included the raid on Osama bin Laden, the Benghazi attack, the leaks of Edward Snowden, and Russia's influence operation during the 2016 U.S. election...
Author
Pub. Date
20180403
Description
Former U.S. Senator Weston Rhodes is a defense contractor with an urgent problem. His company needs someone to look over the books of Dalfan Technologies, a Singapore company -- quickly. He turns to his old friend Gerry Hendley for help. Hendley Associates is one of the best financial analysis firms in the country and the cover for The Campus, a top-secret American intelligence agency. Rhodes asks for two specific analysts, Jack Ryan Jr., and Paul...
Author
Series
William Sandberg novels volume 2
Pub. Date
2018.
Description
One winter evening just before Christmas, Stockholm is plunged into a sudden, citywide blackout. Radio, internet, phone service--all cut out simultaneously, cloaking the city in darkness and silence. On the pitch-black streets, a young woman carries a message for her estranged father. It may be the key to reversing the blackout and preventing further attacks. But someone powerful is determined to stop her from delivering it...
Author
Series
Jack Reacher novels volume 25
Pub. Date
[2020].
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Series
Jack Stratton novel volume 5
Pub. Date
2015.
Description
"Jack Stratton's back is up against the wall. He's broke, kicked off the force, and the bounty hunting business has slowed to a trickle. With no money coming in, Jack's license to carry suspended, and no good job prospects on the horizon, Jack's got it tough. He thinks things are turning around when Replacement gets a lucrative job setting up a home data network. That is, until he discovers it's for a handsome, jet-setting software tycoon. The 'boy...
Pub. Date
c2006
Description
"This text focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes." - publisher's description....
Author
Pub. Date
2015.
Description
"When Western intelligence services recognize that a global jihadist attack has been initiated, the United States and the United Kingdom���its primary targets���lead a desperate counteroffensive. Sally Hanning, a brilliant British MI5 agent, is assigned to assist the CIA task force. She must help them hunt down the enemy mastermind along an intricately disguised online trail. To do so, she entails the services of Jack Irvine, a guilt-burdened...
Author
Series
Description
Deep Black: Conspiracy: A Secret Service agent is dead, an apparent suicide. A presidential candidate narrowly escapes an assassins bullet. And Desk Three, a covert branch of the NSA, is searching for a chilling connection deep inside the Republic of Vietnam. Once, Charlie Dean was a Marine sniper in Quang Nam Province. Today hes a Deep Black operator, returning to Vietnam to find the source of some threatening e-mail. Instead, he comes face to face...
60) Dark winter
Author
Series
Formats
Description
By the time anyone realizes what's happening, it is too late. A dark network of hackers has infiltrated the computers of the U.S. military, unleashing chaos across the globe. U.S. missiles strike the wrong targets. Defense systems fail. Power grids shut down. Within hours, America's enemies move in. Russian tanks plow through northern Europe. Iranian troops invade Iraq. North Korean destroys Seoul and fires missiles at Japan. Phase 1 of ComWar is...