Catalog Search Results
Author
Description
A chilling Dark Web thriller An anonymous website, a few clicks, and Joe Henderson's life is changed forever. 'The Red Room' is the only place where the failings of a weak justice system are righted and where the line between good and evil becomes blurred. When the lights go up, viewers bid, criminals are punished, and the Brotherhood of the Righteous broadcasts a show like no other. The room has remained hidden until now, when a video arrives in...
Author
Description
When CIA Officer Tom Grant was pulled out of early retirement to investigate a recent high-tech robbery at United States Nanotechnologies, America's government-run agency for the development of nanoweapons, he had no idea that he would be propelled into the middle of a conspiracy that could threaten the survival of our species.
Teaming up with young Rachel Muratani, a rising star in the agency, and Karen Frost, an old hand from the FBI, Grant tracks...
4) Rogue Code
Author
Description
Michael Lewis' Flash Boys revealed how high frequency trading has created a ruthless breed of traders capable of winning whichever way the market turns. In Rogue Code, Mark Russinovich takes it one-step further to show how their grip on high finance makes the stock market vulnerable to hackers who could bring about worldwide financial collapse.
Cyber security expert Jeff Aiken knows that no computer system is completely secure. When he's called to...
5) Brainchip
Author
Description
Ein Thriller der Extraklasse! Dieser Roman wirft einen realen Blick in die atemberaubende Zukunft der Gehirnchip-Welt und der künstlichen Intelligenz. "Die Zukunft ist in dir!", das ist die unmissverständliche Aussage der Neuroforscher. Und diese einzigartige Zukunft hat längst begonnen. Genau hier. In diesem Buch. Sie wird sich schon bald und überall in unseren Köpfen abspielen. Mensch und Mikrochip werden eins. Schöne neue Welt der Nanos und...
Author
Description
A techno-thriller novel of the near future when a powerful Artificial Intelligence called Oracle identifies individuals who pose a significant risk to the stability of our society, or who have a high probability of posing such a risk in the future, and sends assassins to kill them. Oracle knows each of us so well, better than we know ourselves, that it is able to determine who might become the next Hitler or Stalin long before that person even has...
Author
Description
Cyber Knights 1.1 is the second part in a stunning two-part collection of stories based on true-life cyber vulnerabilities, by Harold Coyle and Jennifer Ellis
Here be Dragons. In the Age of Discovery, unexplored areas of a map were often marked with this warning. Today, such a warning could easily be applied to the internet. Hackers and cyber assassins present a constant threat to individuals, companies, and institutions.
Protecting these targets...
Author
Description
The silicon chip, the soul of today's machines, governs every aspect of our modern society. Dominance in semiconductors equates dominance in the new millennium. But, something has gone wrong. A terrible railway accident in Florida, leaving dozens dead, and countless more injured is traced to faulty computer chips. One-woman figures out that the faulty chips weren't due to negligence, but to sabotage. Erika Conklin was forced to work for the FBI due...
Author
Description
Hunted by the top companies in America, Michael Patrick Ryan was offered the world: high starting salaries, stock options, and signing bonuses. Ryan set his sites on SoftCorp, Inc., a company with only one client-the Internal Revenue Service.
But, Mike Ryan has also fallen into the sights of the FBI. Millions of dollars have been smuggled out of the country, and Karen Frost suspects it's someone in the IRS. The deal: federal protection and immunity...
10) Sabotage
Author
Description
A cruise ship loses power in the North Atlantic. A satellite launches in the South Pacific. Professor Malcolm Clare-celebrated aviator, entrepreneur, and aerospace engineer-disappears from Stanford University and wakes up aboard an unknown jet, minutes before the aircraft plunges into the high seas.
An extortionist code-named "Viking" has seized control of a private warfare technology, pitting a U.S. defense corporation against terrorist conspirators...
11) Tempest Down
Author
Description
An experimental U.S. Submarine, the Tempest D, with a propulsion system five-times-faster than traditional drives is to be tested in the remote South Polar waters. Chinese intelligence learns of the test and sends their own submarine to observe. When an underwater collision causes the submarines to become trapped under the Antarctic ice, they need each other to survive. Meanwhile, a U.S. military team codenamed L.A.S.E.R., Land Air Sea Emergency Rescue,...
12) Firewall
Author
Description
The final words that Mortimer Fox whispered to ex CIA agent Bruce Tucker. Cryptic words said in a code coveted the world over, a code that could wipe all the world's powers off the map and trigger Armageddon. The words are understood by a few, but are especially desirable to Vlad Jarkko, Tucker's nemesis from his CIA days. And, when Jarkko snatches Monica Fox, Mortimer's daughter, Tucker must resume the blood feud and find Monica before she capitulates...
Author
Description
On October 28, 1943, a U.S. Navy ship was successfully teleported with disastrous effects on its crew. Crewmen died, developed rare or yet unidentified diseases, and most horrifying of all, some became fused to the metal, their arms and legs protruding from the bulkhead.
A team of psychologists has gathered at a small university to study and analyze the same reoccurring dream of seven completely different people. The dream involves a large navy ship...
14) Madeira
Author
Description
Value Engineer Rave Maps lost a vital business consulting opportunity working on the Portuguese island of Madeira.
Then she nearly lost her life.
Rave's VE skills are tested as she struggles to fulfill client obligations racing from Madeira to Toronto, Paris, Steamboat Springs, and St. Lucia fighting to remain a step ahead of BrainRanger AI, an artificial intelligence working to steal her clients and appropriate everything she knows.
To survive,...
Author
Description
Mac Savage, a former CIA officer; Marie Kovacs, a former nanotechnology scientist turned missionary; and Kate Chavez, a Texas Ranger investigating a murder, join forces to unravel a global conspiracy that starts with the diamond industry and ends with a plan to eliminate the human race.
The Donovan Group, a high-powered global conglomerate, has used diamond-based technology to create an overarching artificial intelligence, known as ANNE. Using spyware...
Author
Description
How does a video on YouTube go viral? What would it be like to experience that? Or, what would it be like become a YouTube and internet sensation? Well, in 'adventures in cyberland', not only is this modern-day new phenomenon experienced by the reader, but also shows them the power of group creativity and working together as a team, regardless of what background and worldviews each roommate comes from.
And with this established in the first part...
17) Drumbeats
Author
Description
This dark fantasy set in Africa is a collaboration between a New York Times–bestselling author and the drummer from the multi-platinum rock band, Rush.
A chilling tale of African drums and human souls from #1 international bestselling author Kevin J. Anderson and legendary Rush lyricist and drummer Neil Peart.
Early in their three decades of correspondence, Neil Peart sent Kevin J. Anderson extensive descriptions and travelogues of his...
Author
Description
In a derelict squat, the Smart Man watches as the new narcotic developed by his shadowy organisation wreaks havoc on it, unsuspecting victims. The drug is now ready for sale on their exclusive darknet marketplace. Elsewhere, DCI Robert Smith, the retired head of the Cyber Crimes Unit, seeks out crime boss Curtis Slater at his remote farm. He offers to provide Slater with information in exchange for money. But, what information is he offering? Meanwhile,...
Author
Description
A thought-provoking new short story from the acclaimed author of Zero Day and Trojan Horse.
Challenging Anonymous is like waving a red flag in front of a bull. But the CEO of a major investment firm has done just that, and now cyber security expert Jeff Aiken has to try to protect the company from its leader's mistakes. The timing couldn't be worse, as Jeff is scheduled to appear at a conference that has invited an Anonymous representative as well....
Author
Description
Freddie Lima is a technical unicorn who has worked as a Software Engineer, Systems Engineer, and Security Engineer with over 30 years of technology experience. Freddie's wife Ginger is the CEO of the company they co-own, All Things Operations (ATO). In "Growing Future Operators," Freddie shares his professional experiences through fiction.
Jack Whitaker is a technology curmudgeon who prides himself on teaching the classics. He has a great reputation...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request