Catalog Search Results
1) The fox
Author
Language
English
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Mortality doctrine volume 2
Accelerated Reader
IL: UG - BL: 5.2 - AR Pts: 12
Language
English
Formats
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
4) The minders
Author
Publisher
Berkley
Pub. Date
2021.
Language
English
Description
"The new high concept thriller from the author of The Passengers and the word-of-mouth sensation The One, soon to be a Netflix original series. In the 21st century, information is king. But computers can be hacked and files can be broken into - so a unique government initiative has been born. Five ordinary people have been selected to become "minders" - the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure,...
Author
Series
Mortality doctrine volume 3
Accelerated Reader
IL: UG - BL: 5.4 - AR Pts: 12
Language
English
Formats
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
Author
Series
Mortality doctrine volume 1
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 11
Language
English
Formats
Description
Michael is a gamer. And like most gamers, he almost spends more time on the VirtNet than in the actual world. The VirtNet offers total mind and body immersion, and it's addictive. Thanks to technology, anyone with enough money can experience fantasy worlds, risk their life without the chance of death, or just hang around with Virt-friends. And the more hacking skills you have, the more fun. Why bother following the rules when most of them are dumb,...
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Publisher
Simon & Schuster
Pub. Date
2016.
Language
English
Description
"The never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invented and employ the wars of the present and future--the cyber wars where every country can be a major power player and every hacker a mass destroyer, as reported by a Pulitzer Prize--winning security and defense journalist"--
Author
Publisher
Atlantic Monthly Press
Pub. Date
c2011
Language
English
Description
This book is a cyber-crime story that explores the Conficker Computer "Worm," a potentially devastating computer virus that has baffled experts and infected as many as 12 million computers to date. It is about the next frontier in terrorism. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. The worm, exploiting the security flaws in Microsoft Windows, grew at an astonishingly...
Author
Publisher
BenBella Books
Pub. Date
[2021]
Language
English
Description
"From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection"--
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Author
Publisher
Ecco
Pub. Date
c2010
Language
English
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...
Author
Publisher
Weldon Owen International
Pub. Date
[2020]
Language
English
Description
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist...
17) Hostage run
Author
Series
MindWar trilogy volume 2
Publisher
Thomas Nelson
Pub. Date
[2015]
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 12
Language
English
Description
"Rick Dial is faced with an impossible choice: save the life of his best friend Molly. or save the free world. Rick Dial's career as a superstar quarterback ended when a car accident left him unable to walk. But his uncanny gaming ability caught the attention of a secret government organization trying to stop a high tech terrorist attack on America. He's been to the fantastical cyber world called the MindWar Realm. and returned to Real Life victorious....
18) Skinner
Author
Pub. Date
2013
Language
English
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to the hinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile. His asset is Jae, a roboticist with a gift for seeing the underlying...
Author
Publisher
Crown Publishers, an imprint of the Crown Publishing Group
Pub. Date
[2018]
Language
English
Description
In 2015, Russian hackers tunneled into the computer systems of the Democratic National Committee, and the emails they stole may have changed the course of American democracy. That same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. American...
20) MindWar
Author
Series
MindWar trilogy volume 1
Publisher
Thomas Nelson
Pub. Date
[2014]
Accelerated Reader
IL: MG+ - BL: 5.4 - AR Pts: 11
Language
English
Description
"Rick Dial has the potential to be a hero. He just doesn't know it yet. Rick's high school football team couldn't be stopped when he was leading them as their quarterback. He was going to Syracuse on a scholarship. But then his dad abandoned them and a terrible accident left him crippled.Certain his old life is completely lost, Rick spends months hiding away in his room playing video games. He achieves the highest scores on so many games that he'sapproached...
Interlibrary Loans
Didn't find what you need? Items not owned by Arcadia Public Library can be requested from other libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request