Catalog Search Results
Author
Language
English
Description
NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter.
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to...
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to...
Author
Language
English
Description
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day....
4) Cyberattacks
Language
English
Description
Contains a collection of essays about cyberattacks and cyberterrorism, and highlights the applications of cyberattacks, how they occur, and what can be done to prevent them.
5) The sentinel
Author
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Language
English
Description
The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide...
Author
Language
English
Description
"Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense expert P.W. Singer and Council on Foreign Relations fellow Emerson Brooking"--
Language
English
Description
We'd like to think they're invincible, but America's power stations, water supplies, financial systems, and military communications are all vulnerable to attack. And the most pressing threat isn't from bombs or other physical dangers-it's from computer hacking. What can be done to protect our infrastructure and prevent a devastating digital assault? To find out, this CNBC Original documentary goes to the frontlines of the war on cybercrime and cyber-terrorism....
Author
Language
English
Description
With constant headlines announcing the latest infiltration by hackers, it is more important than ever to be well informed on the topic. In this timely book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals...
14) The fox
Author
Language
English
Appears on list
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Language
English
Description
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
Language
English
Description
The American edge in digital technologies-upon which our financial, communications, and defense systems are built, and on which they depend-may also represent a serious American Achilles' heel. This technological prowess also provides one great big and sprawling target to enemies determined to discover the choke points that can cripple us in a time of war. It's alarming to contemplate-but possibly, also, alarmist? In this debate, the team arguing...
20) Infinite detail
Author
Language
English
Formats
Description
Before: In Bristol's center lies the Croft, a digital no-man's land cut off from the constant surveillance, big data, and corporate hegemony that have overrun the rest of the world. Ten years in, it's become a hub of creative counterculture. But it's fraying at the edges, radicalizing from inside. How will it fare when its chief architect, Rushdi Mannan, takes off to meet his boyfriend in New York City--now the apotheosis of the new techo-utopian...