Catalog Search Results
Author
Formats
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
2) Zero day
Author
Description
"Over the Atlantic, an airliner's controls suddenly stop reacting. In Japan, an oil tanker runs aground when its navigational system fails. And in the Midwest, a nuclear power plant nearly becomes the next Chernobyl. At first, these computer failures seem unrelated. But Jeff Aiken, a former government analyst who saw the mistakes made before 9/11, fears that there may be a more serious attack coming. And he soon realizes that there isn't much time...
3) El zorro
Author
Description
"Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as 'The Fox.' Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Description
The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide...
Author
Description
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information...
Author
Description
When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant British MI5 agent whose parents were massacred in a terrorist ambush, is seconded to the CIA task force to hunt the Iranian mastermind through Al Qaeda's intricately coded use of social media and the Internet. Jack Irvine is NSA's guilt-burdened code-cracker--it...
Description
Disc 1: Doomsday 2012: the End of Days: Doomsday is foretold in the Mayan calendar, the Chinese oracle of the I Ching and an Internet-based prophetic softward program. December 21, 20012 will be the End of Days. Mayan doomsday prophecy: The Maya were legendary astronomers and timekeepers. Thier calendar is more accurate than our own. They tracked stars and planets and assigned great meaning to astronomical phenomena and made the 2012 doomsday prophecy...
Author
Formats
Description
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
Author
Description
The days that change your life forever start off like all the others. One winter evening just before Christmas, Stockholm is plunged into a sudden, citywide blackout. Radio, internet, phone service--all cut out simultaneously, cloaking the city in darkness and silence. On the pitch-black streets, a young woman carries a message for her estranged father. It may be the key to reversing the blackout and preventing further attacks. But someone powerful...
14) Dragon day
Description
Duke, an out-of work NSA engineer, finds his family stuck in a small mountain town the day a devastating cyber attack destroys out country as we know it. Every microchip "made in China" has been infected with a virus that rapidly shuts down all modern technology. Duke's fate becomes intertwined with a Mexican migrant worker as they fight the odds to survive in a chaotic world, without water, food or power.
15) Skinner
Author
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to thehinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile... At the root of it all is a young boy, the innocent seed of a plot grown...
17) Price of duty
Author
Formats
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
20) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Description
An urgent new warning from two bestselling security experts--and a gripping inside look at how governments, firms, and ordinary citizens can confront and contain the tyrants, hackers, and criminals bent on turning the digital realm into a war zone. "In the battle raging between offense and defense in cyberspace, Clarke and Knake have some important ideas about how we can avoid cyberwar for our country, prevent cybercrime against our companies, and...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request