Catalog Search Results
Author
Formats
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
4) Savage road
Author
Description
Hayley Chill descends even deeper into the dangerous political web of Washington D.C. when she seeks the source of devastating cyber attacks against the United States while trying to prevent the president from starting another world war.
Author
Formats
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
7) The sentinel
Author
Description
It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
10) Dragon day
Description
Duke, an out-of work NSA engineer, finds his family stuck in a small mountain town the day a devastating cyber attack destroys out country as we know it. Every microchip "made in China" has been infected with a virus that rapidly shuts down all modern technology. Duke's fate becomes intertwined with a Mexican migrant worker as they fight the odds to survive in a chaotic world, without water, food or power.
11) The fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
12) The eye of minds
Author
Description
Michael is a gamer. And like most gamers, he almost spends more time on the VirtNet than in the actual world. The VirtNet offers total mind and body immersion, and it's addictive. Thanks to technology, anyone with enough money can experience fantasy worlds, risk their life without the chance of death, or just hang around with Virt-friends. And the more hacking skills you have, the more fun. Why bother following the rules when most of them are dumb,...
13) Zero day
Author
Description
"Over the Atlantic, an airliner's controls suddenly stop reacting. In Japan, an oil tanker runs aground when its navigational system fails. And in the Midwest, a nuclear power plant nearly becomes the next Chernobyl. At first, these computer failures seem unrelated. But Jeff Aiken, a former government analyst who saw the mistakes made before 9/11, fears that there may be a more serious attack coming. And he soon realizes that there isn't much time...
15) Skinner
Author
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to thehinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile... At the root of it all is a young boy, the innocent seed of a plot grown...
Author
Description
When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant British MI5 agent whose parents were massacred in a terrorist ambush, is seconded to the CIA task force to hunt the Iranian mastermind through Al Qaeda's intricately coded use of social media and the Internet. Jack Irvine is NSA's guilt-burdened code-cracker--it...
17) El zorro
Author
Description
"Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as 'The Fox.' Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
18) Dark winter
Author
Description
By the time anyone realizes what's happening, it is too late. A dark network of hackers has infiltrated the computers of the U.S. military, unleashing chaos across the globe. U.S. missiles strike the wrong targets. Defense systems fail. Power grids shut down. Within hours, America's enemies move in. Russian tanks plow through northern Europe. Iranian troops invade Iraq. North Korean destroys Seoul and fires missiles at Japan. Phase 1 of ComWar is...
Author
Description
The days that change your life forever start off like all the others. One winter evening just before Christmas, Stockholm is plunged into a sudden, citywide blackout. Radio, internet, phone service--all cut out simultaneously, cloaking the city in darkness and silence. On the pitch-black streets, a young woman carries a message for her estranged father. It may be the key to reversing the blackout and preventing further attacks. But someone powerful...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request