Catalog Search Results
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Series
Pub. Date
2012.
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is...
Author
Series
Mortality doctrine volume 3
Formats
Description
The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day. If Kaine succeeds, it will mean worldwide cyber domination. And it looks like Michael and his friends are the only ones who can put the monster back in the box--if Michael can figure out who his friends really are.
Author
Series
Gateway to chaos volume 2
Description
While a cyber-attack crippled half the nation's power grid, enemies of the United States launched a super EMP over the midwest sending the nation back to the stone age. Deep into the coldest midwest winter on record, the nation is plunged into frigid darkness. With emergency services crippled by the lack of transportation and streets snarled with stalled cars, a spark ignites and the city of St. Louis is engulfed in flames. Chaos grips the city as...
Author
Series
Mortality doctrine volume 2
Pub. Date
[2014]
Formats
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
Author
Formats
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
8) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
9) Alert
Author
Series
Description
New Yorkers aren't easily intimidated, but someone is doing the9ir best to scare them, badly. Why? After two crippling high-tech attacks, the entire city is on edge. Detective Michael Bennett, along with his old pal, the FBI's Emily Parker, has to catch the shadowy criminals who claim responsibility -- but they're as good at concealing their identities as they are at wreaking havoc. When a shocking murder in broad daylight points to killers both...
Author
Pub. Date
2018.
Description
Three initiatives integrate cyber security resources to protect Colorado elections: 1) Securing the statewide voter registration system; 2) Securing overseas and military ballot return with encryption; 3) Colorado threat information sharing and joint fusion center. These initiatives make Colorado one of the safest states to cast a ballot resulting in one of the highest voter turnout.
Author
Series
Formats
Description
The head of the U.S. National Underwater and Marine Agency’s (NUMA) Special Assignments Team unravels a new mystery in the dangers above and below the sea in the latest addition to the long-running series following Fast Ice.
A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe...
13) Price of Duty
Author
Series
Patrick McLanahan novels volume 21
Formats
Description
In a top-secret location deep in the Ural Mountains, Russian President Gennadiy Gryzlov has built his nations most dangerous weapon since the atomic bomb-a fearsome tool to gain superiority in Russias long-running battle with the West. From inside Perun Aerie-an intricate network of underground tunnels and chambers that is the heart of the Russian cyber warfare program-he is launching a carefully plotted series of attacks on an unsuspecting U.S. and...
14) MindWar: a novel
Author
Series
MindWar trilogy volume 1
Description
"Rick Dial has the potential to be a hero. He just doesn't know it yet. Rick's high school football team couldn't be stopped when he was leading them as their quarterback. He was going to Syracuse on a scholarship. But then his dad abandoned them and a terrible accident left him crippled. Certain his old life is completely lost, Rick spends months hiding away in his room playing video games. He achieves the highest scores on so many games that he'sapproached...
Author
Series
Pike Logan thrillers volume 17
Formats
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
16) Infinite detail
Author
Pub. Date
2019.
Description
BEFORE: In Bristol’s center lies the Croft, a digital no-man’s-land cut off from the surveillance, Big Data dependence, and corporate-sponsored, globally hegemonic aspirations that have overrun the rest of the world. Ten years in, it’s become a center of creative counterculture. But it’s fraying at the edges, radicalizing from inside. How will it fare when its chief architect, Rushdi Mannan, takes off to meet his boyfriend in New York City―now...
17) Hostage run
Author
Series
MindWar trilogy volume 2
Pub. Date
[2015]
Description
"Rick Dial is faced with an impossible choice: save the life of his best friend Molly. or save the free world. Rick Dial's career as a superstar quarterback ended when a car accident left him unable to walk. But his uncanny gaming ability caught the attention of a secret government organization trying to stop a high tech terrorist attack on America. He's been to the fantastical cyber world called the MindWar Realm. and returned to Real Life victorious....
Author
Pub. Date
2018
Formats
Description
"In the face of a President who lobs accusations without facts, evidence, or logic, truth tellers are under attack. Meanwhile, the world order is teetering on the brink. North Korea is on the verge of having a nuclear weapon that could reach the United States; Russians have mastered a new form of information warfare that undercuts democracy; and the role of China in the global community remains unclear. There will always be value to experience and...
19) Cyberterrorism
Author
Pub. Date
2019.
Description
A book for young readers about the concept of cyberterrorism, its consequences, and the future of computer use--
Author
Formats
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...