Catalog Search Results
21) Infinite detail
Author
Pub. Date
2019.
Description
BEFORE: In Bristol’s center lies the Croft, a digital no-man’s-land cut off from the surveillance, Big Data dependence, and corporate-sponsored, globally hegemonic aspirations that have overrun the rest of the world. Ten years in, it’s become a center of creative counterculture. But it’s fraying at the edges, radicalizing from inside. How will it fare when its chief architect, Rushdi Mannan, takes off to meet his boyfriend in New York City―now...
22) Hostage run
Author
Series
MindWar trilogy volume 2
Pub. Date
[2015]
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 12
Description
"Rick Dial is faced with an impossible choice: save the life of his best friend Molly. or save the free world. Rick Dial's career as a superstar quarterback ended when a car accident left him unable to walk. But his uncanny gaming ability caught the attention of a secret government organization trying to stop a high tech terrorist attack on America. He's been to the fantastical cyber world called the MindWar Realm. and returned to Real Life victorious....
Author
Pub. Date
2018
Formats
Description
"In the face of a President who lobs accusations without facts, evidence, or logic, truth tellers are under attack. Meanwhile, the world order is teetering on the brink. North Korea is on the verge of having a nuclear weapon that could reach the United States; Russians have mastered a new form of information warfare that undercuts democracy; and the role of China in the global community remains unclear. There will always be value to experience and...
Author
Formats
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...
25) Cyberterrorism
Author
Pub. Date
2019.
Accelerated Reader
IL: MG - BL: 8.7 - AR Pts: 2
Description
A book for young readers about the concept of cyberterrorism, its consequences, and the future of computer use--
Author
Pub. Date
2019.
Description
When cybersecurity expert Jake Braun challenged hackers at DEFCON, the largest hacking conference in the world, to breach the security of an American voting machine, a hacker in Europe conquered the task in less than 2 minutes. From hacking into voting machines to more mundane, but no less serious problems, our democracy faces unprecedented tests from without and within. In Democracy In Danger, Braun, a veteran of 3 presidential campaigns and former...
Author
Series
Peter Rena and Randi Brooks volume 4
Pub. Date
[2021]
Description
Billionaire entrepreneur and President of the U.S., David Traynor calls upon ruthless DC fixers Peter Rena and Randi Brooks, who must help him salvage American politics while dealing with cyberattacks and a world on the cusp of enormous change.
28) Cyber wars
Author
Series
Pub. Date
2018.
Accelerated Reader
IL: MG - BL: 7.8 - AR Pts: 1
Description
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace. Cyber Wars traces the outcomes of these efforts through eyewitness accounts, background information about conflicts, and question prompts that encourage critical thinking about the ways that technology affects world events.
30) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
Author
Pub. Date
2018.
Description
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away.
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate...
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate...
Author
Pub. Date
[2022]
Description
"It's the near future, and tens of thousands of species are going extinct every year. The loss is not total, though: the DNA sequences of many species are being digitized and uploaded to a global network of "biobanks," together with brain and body scans, recordings of behavior in the wild, microbiota profiles, and so forth, in the hope that the extinct victims of humanity's destructiveness might one day be resurrected. Then comes the day when the...
33) The ascendant
Author
Series
Garrett Reilly thrillers volume 1
Pub. Date
2014.
Description
An unlikely hero--a number savant named Garrett Reilly--races around the globe to avert total war.
Author
Pub. Date
2017.
Accelerated Reader
IL: MG - BL: 8.2 - AR Pts: 1
Description
Cyber technology and counterterrorism are a hot topic today, and this book details how criminals, terrorists, and enemy governments attempt to use technology against the United States. How can we counter this threat? What training is our military and government using to prevent and/or repel cyberattacks? Students will learn about the cyber warriors who protect our nation's information networks. Historical accounts include narrative about the codebreakers...
Author
Pub. Date
[2016]
Description
"The sitting chairman of the Homeland Security Committee, who receives daily intelligence about threats materializing against America, depicts in real time the hazards that [he believes] are closer than we realize. From cyberwarriors who can cripple the Eastern seaboard to radicalized Americans in league with Islamic jihadists to invisible biological warfare, many of the most pressing dangers are the ones [he feels] we've heard about the least--and...
Author
Pub. Date
[2018]
Description
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Series
Tom Clancy's Net Force (Adult series) volume 11
Pub. Date
[2019]
Description
The number one threat to the nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven, and officially unnamed, Net Force's elite group of...
38) Code hunter
Pub. Date
2002
Description
America's best player is being pulled in the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's most wanted list, and is blackmailing him to take part in a real twisted plan of world destruction.