Catalog Search Results
Pub. Date
c2007
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the U.S. Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. As soon as John gets to Matt's apartment,...
Author
Pub. Date
2017.
Description
"A veteran Washington Times columnist explains how the United States can beat China, Russia, Iran, and ISIS in the coming information-technology wars. America is at war, but most of its citizens don't know it. Covert information warfare is being waged by world powers, rogue states--such as Russia, China, Iran, and North Korea--and even terrorist groups like ISIS. This conflict has been designed to defeat and ultimately destroy the United States....
43) Total power
Author
Series
Mitch Rapp novels volume 19
Pub. Date
2020
Formats
Description
When an ISIS plot devastates America's power grid, Mitch Rapp and his CIA team race to find the responsible cyberterrorists to prevent the nation from succumbing to total collapse.
45) Escapology
Author
Pub. Date
2016.
Description
"Shock Pao is the best. In the virtual world the Slip there's nothing he can't steal for the right price. Outside the Slip, though, he's a Fail - no degree, no job. So when his ex offers him a job, breaking into a corporate databank, he accepts--it's either that, or find himself a nice bench to sleep under. Amiga works for psychotic crime lord Twist Calhoun so when Shock's war comes to her, it's her job to bring him to Twist, dead or alive."--Amazon.com...
46) Cyberwarfare
Series
Pub. Date
[2018]
Description
There is warfare, and there is cyberwarfare. In today's technologically-driven world, governments, and even terrorist groups and hacktivists, engage in cyberwarfare to attack or disrupt the operations of other nations and organizations. Recent revelations about cyberattacks that threatened individual and national security have caused ripples of concern and outrage, but tend to die down quickly. How safe are we, and do we take security for granted?...
47) Terms of use
Author
Pub. Date
[2015]
Description
Circles is the most popular social network in the world: vast, ubiquitous, and constantly evolving. Days before expanding into China, Circles suffers a devastating cyberattack--and a key executive is brutally murdered. As he fights to save the company he helped build, top engineer Sergio Mansour uncovers evidence of a massive conspiracy that turns the power of Circles against its users. But as Sergio investigates, someone is watching his every move--someone...
48) The minders
Author
Pub. Date
2021.
Description
"The new high concept thriller from the author of The Passengers and the word-of-mouth sensation The One, soon to be a Netflix original series. In the 21st century, information is king. But computers can be hacked and files can be broken into - so a unique government initiative has been born. Five ordinary people have been selected to become "minders" - the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure,...
Author
Pub. Date
20180403
Description
Former U.S. Senator Weston Rhodes is a defense contractor with an urgent problem. His company needs someone to look over the books of Dalfan Technologies, a Singapore company -- quickly. He turns to his old friend Gerry Hendley for help. Hendley Associates is one of the best financial analysis firms in the country and the cover for The Campus, a top-secret American intelligence agency. Rhodes asks for two specific analysts, Jack Ryan Jr., and Paul...
Author
Series
William Sandberg novels volume 2
Pub. Date
2018.
Description
One winter evening just before Christmas, Stockholm is plunged into a sudden, citywide blackout. Radio, internet, phone service--all cut out simultaneously, cloaking the city in darkness and silence. On the pitch-black streets, a young woman carries a message for her estranged father. It may be the key to reversing the blackout and preventing further attacks. But someone powerful is determined to stop her from delivering it...
Author
Series
Tom Clancy's Power Plays volume 6
Formats
Description
Africa has become the battleground of a 21st-century war. As fiber-optic cable is laid down around the continent, UpLink Communications, headed by Roger Gordian, battles for control against his nemesis, Harlan DeVane, who trades in black-market commodities with terrorists and rogue states. DeVane kidnaps Gordian's daughter to ensure his success. Now Gordian must trust his UpLink team as never before.
Author
Series
Jack Stratton novel volume 5
Pub. Date
2015.
Description
"Jack Stratton's back is up against the wall. He's broke, kicked off the force, and the bounty hunting business has slowed to a trickle. With no money coming in, Jack's license to carry suspended, and no good job prospects on the horizon, Jack's got it tough. He thinks things are turning around when Replacement gets a lucrative job setting up a home data network. That is, until he discovers it's for a handsome, jet-setting software tycoon. The 'boy...
Author
Series
Jack Reacher novels volume 25
Pub. Date
[2020].
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Pub. Date
c2006
Description
"This text focuses on both the technical aspects of digital crime as well as behavioral aspects of computer hackers, virus writers, terrorists and other offenders. Using real life examples and case studies, the book examines the history, development, extent and types of digital crime and digital terrorism as well as current legislation and law enforcement practices designed to prevent, investigate and prosecute these crimes." - publisher's description....
Author
Pub. Date
2015.
Description
"When Western intelligence services recognize that a global jihadist attack has been initiated, the United States and the United Kingdom���its primary targets���lead a desperate counteroffensive. Sally Hanning, a brilliant British MI5 agent, is assigned to assist the CIA task force. She must help them hunt down the enemy mastermind along an intricately disguised online trail. To do so, she entails the services of Jack Irvine, a guilt-burdened...
56) La batalla final
Author
Pub. Date
[2016].
Description
Michael vivía para jugar, pero en los juegos que le gustaban son ahora demasiados reales, demasiado peligrosos. Red virtual se ha convertido enun mundo catastrófico, y Kaine es cada vez más fuerte. La línea que separa la realidad virtual de la auténtica es cada vez más difusa. Si Kiane se sale con la suya, conseguirá ciberdominar el mundo, y parece que Michael y sus amigos son los únicos que pueden evitarlo.
The VirtNet has become a world...
57) Turbulent
Author
Series
Days of want volume 1
Pub. Date
[2019]
Description
When coordinated EMP and Cyber attacks wipe out the nation's power grid, communications and transportation systems, ultra marathon runner, Maddie Langston is forced to run for her life. Stranded in a Chicago airport when the lights go out, Maddie is in a race against time. According to her father, she doesn't have long before the city descends into chaos. She must leave the airport before it is too late. Although she knows she must flee the Windy...
Author
Series
Tom Clancy's Op-Center volume 1
Pub. Date
2017.
Description
Former US Ambassador to the Ukraine Douglas Flannery meets with an old friend and former spy near New Yorkś South Street Seaport. She is seeking his help to thwart a Russian plan to overrun her native Ukraine, but those for whom she is working propose an infinitely more dangerous scheme, one that could draw in NATO forces and possibly ignite World War III. Moments later, as she jogs along the East River, her throat is slashed. Within hours, Op-Center...
Author
Series
Deep black volume 5
Formats
Description
The word's most effective anti-terrorist force has the tools to monitor every move the enemy makes. They've planted a listening device inside a terrorist's skull, and activated a video spy drone disguised as a bird. But knowing is only half the battle. Multi-lingual, nerves-of-steel agents Charlie Dean, Lia DeFrancesca, and Tommy Karr prowl the winding streets of Istanbul to the crowded airports of America to stop terrorists in their tracks. Hooked...