Catalog Search Results
Author
Formats
Description
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Mortality doctrine volume 1
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secret's out"--
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Formats
Description
From the bestselling author of Black Hawk Down, the gripping story of the Conficker worm—the cyberattack that nearly toppled the world.
The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became...
The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became...
6) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
As always, Reacher has no particular place to go, and all the time in the world to get there. One morning he ends up in a town near Pleasantville, Tennessee. But there's nothing pleasant about the place. In broad daylight Reacher spots a hapless soul walking into an ambush. 'It was four against one' so Reacher intervenes, with his own trademark brand of conflict resolution. The man he saves is Rusty Rutherford, an unassuming IT manager, recently fired...
Author
Series
Mortality doctrine volume 2
Formats
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
8) Skinner
Author
Formats
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to the hinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile. His asset is Jae, a roboticist with a gift for seeing the underlying...
Author
Series
Amara Alvarez volume 2
Formats
Description
"Amara Alvarez's first case as a homicide detective drags her into the murky world of computer hackers. When she finds herself under attack by cybercriminals, she has no choice but to use unconventional methods to expose the truth and find a killer"--Provided by publisher.
10) Trojan horse
Author
Series
Jeff Aiken novels volume 2
Publisher
Thomas Dunne Books
Pub. Date
c2012
Description
It's two years post- Zero Day , and former government analyst Jeff Aiken is reaping the rewards for crippling al-Qaida's attack on the computer infrastructure of the Western world. His cyber - security company is flourishing, and his relationship with Daryl Haugen intensifies when she becomes a part of his team. But the West is under the East's greatest threat yet. The Stuxnet virus that successfully subverted Iran's nuclear defense program for years...
Author
Series
Oregon files volume 11
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Author
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Series
Mortality doctrine volume 3
Publisher
Delacorte Press
Pub. Date
[2015]
Description
The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day. If Kaine succeeds, it will mean worldwide cyber domination. And it looks like Michael and his friends are the only ones who can put the monster back in the box--if Michael can figure out who his friends really are.
Author
Formats
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...
Publisher
Universal Studios
Pub. Date
[2017]
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
20) Hostage run
Author
Series
MindWar trilogy volume 2
Formats
Description
"Rick Dial is faced with an impossible choice: save the life of his best friend Molly. or save the free world. Rick Dial's career as a superstar quarterback ended when a car accident left him unable to walk. But his uncanny gaming ability caught the attention of a secret government organization trying to stop a high tech terrorist attack on America. He's been to the fantastical cyber world called the MindWar Realm. and returned to Real Life victorious....
Didn't find what you were looking for? Request an interlibrary loan.
Items not owned by a GMILCS library can be requested from other NHAIS Interlibrary Loan System libraries to be delivered to your local library for pickup.
Recommend a purchase
Can't find what you are looking for? Try our Purchase Request Service. Submit Request