Catalog Search Results
Author
Series
Mortality doctrine volume 1
Language
English
Appears on list
Description
Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out.
Author
Series
Mortality doctrine volume 3
Language
English
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
3) The sentinel
Author
Series
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Series
Mortality doctrine volume 2
Language
English
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
Author
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Publisher
PBS Distribution
Pub. Date
[2016]
Language
English
Description
Thanks in part to the documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield, cyberspace. Nova examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race.
9) The fox
Author
Language
English
Formats
Description
When America's intelligence agencies are breached by a teen hacker, a British MI6 leader endeavors to use the boy's talents to safeguard both nations from unseen enemies.
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Pub. Date
2016.
Language
English
Formats
Description
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information...
Publisher
PBS DVD Video
Pub. Date
c2003.
Language
English
Description
The Slammer hit on Super Bowl Sunday. Nimda struck one week after 9/11. Code Red had ripped through the system that summer. Moonlight Maze moved from the Russian Academy of Science and into the U.S. Department of Defense. A new form of warfare has broken out and the battleground is cyberspace. With weapons like embedded malicious code, probes and pings, there are surgical strikes, reverse neutron bombs, and the potential for massive assaults aimed...
Publisher
20th Century Fox Home Entertainment
Pub. Date
c2005.
Language
English
Description
He's known as 'The Address-Book Killer, ' a murderer who steals strangers' personal information then targets them for his grisly sprees. His dying body gets zapped into a computer mainframe to slaughter the friends and family of Terry Monroe on-line.
Author
Publisher
Berkley
Pub. Date
2007.
Language
English
Description
Third Echelon special operative Sam Fisher investigates the death of a former Justice Department investigator by radiation poisoning, which leads him to a radical Islamic leader in Kytgyzstan who will do anything to destroy the technological world.
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
17) All systems down
Author
Series
The cyber war volume Book 1
Publisher
Lakewater Press
Pub. Date
2018.
Language
English
Description
Pak Han-Yong's day is here. An elite hacker with Unit 101 of the North Korean military, he's labored for years to launch Project Sonnimne: a series of deadly viruses set to cripple Imperialist infrastructure. And with one tap of his keyboard, the rewards are immediate. Brendan Chogan isn't a hero. He's an out-of-work parking enforcement officer and one-time collegiate boxer trying to support his wife and children. But now there's a foreign enemy on...
Publisher
20th Century Fox Home Entertainment
Pub. Date
[2020]
Language
English
Formats
Description
Super spy Lance Sterling and scientist Walter Beckett are almost exact opposites. Lance is smooth, suave, and debonair. Walter is not. But when events take an unexpected turn, this unlikely duo is forced to team up for the ultimate mission that will require an almost impossible disguise, transforming Lance into the brave, fierce, majestic pigeon. Walter and Lance suddenly have to work as a team, or the whole world is in peril.
Author
Language
English
Formats
Description
"Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense expert P.W. Singer and Council on Foreign Relations fellow Emerson Brooking"--
In Interlibrary Loan
Didn't find what you need? Items not owned by Orem Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup. NOTE: WILL REQUIRE A POSTAGE FEE
Didn't find it?
Can't find what you are looking for? You can put in a request for us to add it to the collection. Submit Request