Catalog Search Results
Author
Formats
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
3) Savage road
Author
Description
Hayley Chill descends even deeper into the dangerous political web of Washington D.C. when she seeks the source of devastating cyber attacks against the United States while trying to prevent the president from starting another world war.
Author
Formats
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
8) Dragon day
Description
Duke, an out-of work NSA engineer, finds his family stuck in a small mountain town the day a devastating cyber attack destroys out country as we know it. Every microchip "made in China" has been infected with a virus that rapidly shuts down all modern technology. Duke's fate becomes intertwined with a Mexican migrant worker as they fight the odds to survive in a chaotic world, without water, food or power.
9) The fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
10) Zero day
Author
Description
"Over the Atlantic, an airliner's controls suddenly stop reacting. In Japan, an oil tanker runs aground when its navigational system fails. And in the Midwest, a nuclear power plant nearly becomes the next Chernobyl. At first, these computer failures seem unrelated. But Jeff Aiken, a former government analyst who saw the mistakes made before 9/11, fears that there may be a more serious attack coming. And he soon realizes that there isn't much time...
11) Skinner
Author
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to thehinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile... At the root of it all is a young boy, the innocent seed of a plot grown...
12) El zorro
Author
Description
"Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as 'The Fox.' Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Description
When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant British MI5 agent whose parents were massacred in a terrorist ambush, is seconded to the CIA task force to hunt the Iranian mastermind through Al Qaeda's intricately coded use of social media and the Internet. Jack Irvine is NSA's guilt-burdened code-cracker--it...
14) Dark winter
Author
Description
By the time anyone realizes what's happening, it is too late. A dark network of hackers has infiltrated the computers of the U.S. military, unleashing chaos across the globe. U.S. missiles strike the wrong targets. Defense systems fail. Power grids shut down. Within hours, America's enemies move in. Russian tanks plow through northern Europe. Iranian troops invade Iraq. North Korean destroys Seoul and fires missiles at Japan. Phase 1 of ComWar is...
Author
Description
The days that change your life forever start off like all the others. One winter evening just before Christmas, Stockholm is plunged into a sudden, citywide blackout. Radio, internet, phone service--all cut out simultaneously, cloaking the city in darkness and silence. On the pitch-black streets, a young woman carries a message for her estranged father. It may be the key to reversing the blackout and preventing further attacks. But someone powerful...
Description
In the year 2032, advances in cybernetic technology and genetic research have opened the world to possibilities once only dreamed of. Humans can be fitted with cybernetic modifications, download their brains into permanent robot bodies, or bring home their own intimate robotic companion. It's a life of luxury. Or so it seems. A rash of gruesome murders begins to plague the city and with every lead comes more questions. The culprits, the beloved robotic...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request