Catalog Search Results
Author
Formats
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
3) Zero day
Author
Description
"Over the Atlantic, an airliner's controls suddenly stop reacting. In Japan, an oil tanker runs aground when its navigational system fails. And in the Midwest, a nuclear power plant nearly becomes the next Chernobyl. At first, these computer failures seem unrelated. But Jeff Aiken, a former government analyst who saw the mistakes made before 9/11, fears that there may be a more serious attack coming. And he soon realizes that there isn't much time...
Author
Description
Chas is a detective who doesn't stake out cheating husbands, track down missing persons, or match wits with femmes fatales. Instead of pounding the pavement, he taps a computer keyboard. He can get the goods on anyone, and it's all to make sure superstar Las Vegas mind reader Wallace the Amazing stays amazing. Thanks to Chas's steady stream of stealthy intel, Wallace's mental "magic" packs houses every night. But when someone threatens to call the...
6) The sentinel
Author
Description
It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
8) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Author
Description
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development...
Author
Description
Del mismo autor de los Bestsellers "El Código Da Vinci" y "Ángeles y demonios," FonoLibro les trae una apasionante novela llena de claves secretas, mensajes ocultos, engaños y crímenes.
"Fortaleza Digital" los mantendrá en suspenso y no podrá dejar de escucharlo hasta que llegue al final. La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa...
12) The spy and I
Author
Description
"Right place. Wrong person. After a case of mistaken identity, one woman must work with her sister's sexy spy partner to save the world in this heart-pounding romantic comedy. The first thing to know about Dove Barkley is that, even though she works as a cyber security analyst, she is one hundred percent not an undercover CIA operative. But when a group of bad guys mistake her for her super-spy sister (news to her!), Dove gets roped into a dangerous...
13) Sneakers
Description
Robert Redford leads an all-star cast in one of the most satisfying suspense films! His team is routinely hired to test security systems. Bishop's (Redford) past comes back to haunt him when government agents blackmail the "sneakers" into carrying out a covert operation; tracking down the elusive black box. Bishop's team retrieves the box and makes a stunning discovery--the device can break into any computer system in the world. Also starts Sidney...
Author
Formats
Description
"Two accomplished cyber security experts guide readers through the dangers, traps, and pitfalls of online life. Learn how cyber criminals operate and how you can defend yourself and your family from online security threats. From Facebook, to Twitter, to online banking we are all increasingly exposed online with thousands of criminals ready to bounce on the slightest weakness. This indispensable guide will teach you how to protect your identity and...
Author
Description
"From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. Using real life stories and his own consulting experience, J.J. Luna shows you legal methods for protecting yourself from information predators and how to secure your bank accounts, business dealings, computer files, and even your home address. In this third updated edition, there are...
Author
Description
"Stories of massive data breaches litter the 24-hour newsday headlines. Hackers and cybercrime syndicates are hitting a who's who of banks, retailers, law firms, and healthcare organizations: companies with sophisticated security systems designed to stopcrime before it starts. They're also hitting companies that thought they were too small to matter. So how do cybercriminals continue to breach the defenses of the big companies and why do they go after...
17) Attack surface
Author
Formats
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
19) Firewall
Description
Thieves threaten to kill Jack Stanfield's family if he doesn't hack into a computer system through a firewall he designed in order to transfer 100 million dollars to an offshore account.
Author
Description
"The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request