Catalog Search Results
Author
Series
Language
English
Description
Michael completed the Path. What he found at the end turned everything he'd ever known about his life completely upside down. He thought he'd been helping VirtNet Security to track down the cyber-terrorist Kaine. He thought the VirtNet would be safe for gamers once more. But the truth is more terrifying than he could ever have imagined. Kaine is in fact a Tangent, a computer program that has come alive. And Kaine's master plan is to populate the earth...
Author
Series
Mortality doctrine volume 1
Language
English
Appears on these lists
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secret's out"--
Author
Language
English
Description
NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter.
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to...
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to...
Language
English
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
5) The fox
Author
Language
English
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
Mortality doctrine volume 3
Language
English
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
7) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Appears on list
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Language
English
Formats
Description
Super spy Lance Sterling and scientist Walter Beckett are almost exact opposites. Lance is smooth, suave, and debonair. Walter is not. But when events take an unexpected turn, this unlikely duo is forced to team up for the ultimate mission that will require an almost impossible disguise, transforming Lance into the brave, fierce, majestic pigeon. Walter and Lance suddenly have to work as a team, or the whole world is in peril.
Language
English
Description
The UK is in peril. Five days before the PM is to host her first G12 summit, MI7's security is breached and every agent in the field identified and exposed. The only hope of finding the perpetrator is to bring an agent out of retirement, but with most of them either dead or close to it, the head of MI7 is left with only one choice, and his name is English.
Author
Language
English
Description
"Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense expert P.W. Singer and Council on Foreign Relations fellow Emerson Brooking"--
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away. Through the weaponization of social...
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
13) MindWar
Author
Series
MindWar trilogy volume 1
Language
English
Formats
Description
"Rick's high school football team couldn't be stopped when he was leading them as their quarterback. He was going to Syracuse on a scholarship. But then his dad abandoned them and a terrible accident left him crippled. Certain his old life is completely lost, Rick spends months hiding away in his room playing video games. He achieves the highest scores on so many games that he's approached by a government agency who claims to be trying to thwart a...
Author
Series
Language
English
Description
"In the latest electrifying adventure in Tom Clancy's #1New York Timesbestselling series, Jack Ryan, Jr., learns that sometimes the deadliest secret may be standing right next to you. Former U.S. Senator Weston Rhodes is a defense contractor with an urgent problem. His company needs someone to look over the books of Dalfan Technologies, a Singapore company--quickly. He turns to his old friend Gerry Hendley for help. Hendley Associates is one of the...
15) Cyberterrorism
Author
Language
English
Formats
Description
A book for young readers about the concept of cyberterrorism, its consequences, and the future of computer use--
The last two decades have seen the ever-accelerating development of new technologies, from the internet and software applications to artificial intelligence, drones, and robotics. Alongside these advances, a new global threat has emerged: cyberterrorism. Through full-color photographs, sidebars, and a glossary, students will learn about...
16) Hostage run
Author
Series
MindWar trilogy volume 2
Language
English
Formats
Description
"Rick Dial is faced with an impossible choice: save the life of his best friend Molly, or save the free world. Rick Dial's career as a superstar quarterback ended when a car accident left him unable to walk. But his uncanny gaming ability caught the attention of a secret government organization trying to stop a high tech terrorist attack on America. He's been to the fantastical cyber world called the MindWar Realm. and returned to Real Life victorious....
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Language
English
Appears on list
Description
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers,...
Author
Language
English
Appears on list
Description
Finding himself alone in a posh New York City hotel room for the night, Aidan does what any red-blooded seventeen-year-old would do-- he tries to hook up with someone new. But that lapse in judgment leads to him waking up next to a dead guy, which sparks an epic case of mistaken identity. Now he's on the run from federal agents -- and a cyber-terrorist group who will stop at nothing to find him.
Search More Libraries
Didn't find what you need? Items not owned by SWAN libraries can be requested from other WorldCat libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request