Catalog Search Results
Author
Formats
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
Author
Description
Michael is a gamer. And like most gamers, he almost spends more time on the VirtNet than in the actual world. The VirtNet offers total mind and body immersion, and it's addictive. Thanks to technology, anyone with enough money can experience fantasy worlds, risk their life without the chance of death, or just hang around with Virt-friends. And the more hacking skills you have, the more fun. Why bother following the rules when most of them are dumb,...
5) The sentinel
Author
Description
It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Description
The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide...
Author
Description
"Rick Dial has the potential to be a hero. He just doesn't know it yet. Rick's high school football team couldn't be stopped when he was leading them as their quarterback. He was going to Syracuse on a scholarship. But then his dad abandoned them and a terrible accident left him crippled.Certain his old life is completely lost, Rick spends months hiding away in his room playing video games. He achieves the highest scores on so many games that he'sapproached...
Author
Description
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
Author
Description
"Kurt Austin must find a vanished ship and stave off a global catastrophe in the latest novel in the #1 New York Times-bestselling series created by the 'grand master of adventure' Clive Cussler. A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look...
10) Threat vector
Author
Description
As China plans to invade Taiwan, and launches a cyber attack on the U.S., President Jack Ryan, his son, and the team at the Campus have to act fast if they are going to stop the increasingly rogue nation.
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the United States Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. After John gets to Matt's apartment,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request