Catalog Search Results
Series
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Publisher
Universal Studios Home Entertainment
Pub. Date
[2017]
Language
English
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Author
Series
Mortality doctrine volume 3
Accelerated Reader
IL: UG - BL: 5.4 - AR Pts: 12
Language
English
Formats
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
Author
Series
Camp Valor novels volume 2
Publisher
St. Martin's Griffin
Pub. Date
2020.
Accelerated Reader
IL: UG - BL: 5.4 - AR Pts: 14
Language
English
Description
Funded by a reclusive billionaire Camp Valor alum, Wyatt Brewer and new camper Jalen Rose--a gamer and accidental mass murderer--team up to bring justice to Wyatt's former mentor and to stop cyberterrorist Encyte.
Author
Series
Mortality doctrine volume 2
Accelerated Reader
IL: UG - BL: 5.2 - AR Pts: 12
Lexile measure
750L
Language
English
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
Author
Series
Mortality doctrine volume 1
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 11
Lexile measure
790L
Language
English
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secret's out"--
Publisher
Universal Studios Home Entertainment
Pub. Date
[2017]
Language
English
Description
The series follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Author
Series
Patrick McLanahan novels volume 21
Language
English
Formats
Description
The U.S. and its Western allies come under a diabolical Russian cyber warfare attack in this action-packed military techno-thriller from New York Times bestselling master Dale Brown.
In a top-secret location deep in the Ural Mountains, Russian President Gennadiy Gryzlov has built his nation's most dangerous weapon since the atomic bomb-a fearsome tool to gain superiority in Russia's long-running battle with the West. From inside Perun Aerie-an intricate...
Series
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
10) Skinner
Author
Language
English
Formats
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to the hinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile. His asset is Jae, a roboticist with a gift for seeing the underlying...
Author
Language
English
Formats
Description
"The United States may seem safe from within but beyond its borders, a new enemy rises. An American ship has vanished. The president has tasked the new cyber-intelligence agency, Net Force, with finding out what happened to the vessel. But their investigation reveals a plan that could trigger a world war. Their only option is to strike first. Through the streets of New York, a secret city in Crimea and the depths of the South China Seas, Net Force...
Publisher
Universal Pictures Home Entertainment
Pub. Date
[2019]
Language
English
Formats
Description
The UK is in peril. Five days before the PM is to host her first G12 summit, MI7's security is breached and every agent in the field identified and exposed. The only hope of finding the perpetrator is to bring an agent out of retirement, but with most of them either dead or close to it, the head of MI7 is left with only one choice, and his name is English.
Author
Language
English
Formats
Description
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
"Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants...
15) The fox
Author
Language
English
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Language
English
Formats
Description
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist...
17) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
Jack Reacher follows his lizard-brain instincts on a seemingly uneventful night in Nashville, where a recently fired man nurses an increasingly violent grudge.
When Reacher ends up in a town near Pleasantville, Tennessee, there's nothing pleasant about the place. When he spots someone walking into an ambush, the odds are four against one-- until Reacher intervenes, with his own trademark brand of conflict resolution. The man he saves is Rusty Rutherford,...
Author
Series
Peter Rena and Randi Brooks volume 4
Language
English
Formats
Description
Billionaire entrepreneur and President of the U.S. David Traynor calls upon ruthless DC fixers Peter Rena and Randi Brooks, who must help him salvage American politics while dealing with cyberattacks and a world on the cusp of enormous change.
Series
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Didn't find it?
Can't find what you are looking for? Try submitting a purchase suggestion. Submit Request