Catalog Search Results
Author
Series
Mortality doctrine volume 3
Accelerated Reader
IL: UG - BL: 5.4 - AR Pts: 12
Language
English
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 21 min.) : digital, .flv file, sound
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
3) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Series
Mortality doctrine volume 1
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 11
Language
English
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--
Author
Language
English
Formats
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Publisher
Prometheus Books
Pub. Date
[2023]
Physical Desc
xiv, 285 pages ; 24 cm
Language
English
Description
"The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media-and our democracy-to...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 36 min.) : digital, .flv file, sound
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Series
Songs of the sage volume 1
Language
English
Formats
Description
In a world where language is no longer learned but streamed to neural implants, those who can't afford the streaming services live on the edges of society. Tech corporations control language and, thus, control everything. When a cyberattack leads to a global language outage, Europol detective Emyr Morgan is assigned to the case. But he soon learns that little is as it seems. He must find a way to distinguish fact from fiction and friend from foe to...
Author
Language
English
Formats
Description
"The United States may seem safe from within but beyond its borders, a new enemy rises. An American ship has vanished. The president has tasked the new cyber-intelligence agency, Net Force, with finding out what happened to the vessel. But their investigation reveals a plan that could trigger a world war. Their only option is to strike first. Through the streets of New York, a secret city in Crimea and the depths of the South China Seas, Net Force...
10) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Publisher
Penguin Press
Pub. Date
2019.
Physical Desc
344 pages ; 25 cm
Language
English
Description
Presents an urgent assessment of how governments, businesses, and everyday citizens can counter and prevent attacks by criminal hackers determined to create a digital war zone.
"There is much to fear in the dark corners of cyberspace. From well-covered stories like the Stuxnet attack which helped slow Iran's nuclear program, to lesser-known tales like EternalBlue, the 2017 cyber battle that closed hospitals in Britain and froze shipping crates in...
Author
Series
Mortality doctrine volume 2
Accelerated Reader
IL: UG - BL: 5.2 - AR Pts: 12
Language
English
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
Michael completed the Path. What he found at the end turned everything he'd ever known about his life completely upside down. The truth Michael discovered about Kaine is more complex than anticipated, and more terrifying. Kaine is a tangent, a computer program that has become sentient. Kaine's master plan will populate...
Author
Publisher
Thomas Dunne Books
Pub. Date
2011, ©2011
Edition
First edition.
Physical Desc
320
Language
English
Description
"Over the Atlantic, an airliner's controls suddenly stop reacting. In Japan, an oil tanker runs aground when its navigational system fails. An in the Midwest, a nuclear power plant nearly becomes the next Chernobyl. At first, these computer failures seemunrelated. But Jeff Aiken, a former government analyst who saw the mistakes made before 9/11, fears that there may be a more serious attack coming. And he soon realizes that there isn't much time if...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 22 min.) : digital, .flv file, sound
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 26 min.) : digital, .flv file, sound
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 33 min.) : digital, .flv file, sound
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
16) The fox
Language
English
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Publisher
Smithsonian Channel
Pub. Date
[2018]
Physical Desc
1 videodisc (46 min.) : sound, color ; 4 3/4 in.
Language
English
Description
In Live Free or Die Hard, the fourth chapter in the high-octane action franchise, a mastermind cyber-criminal holds America hostage by wreaking havoc via the Internet. It's a great thriller, but could this imagined scenario ever happen in real life?
Author
Publisher
Thomas Dunne Books, St. Martin's Press
Pub. Date
2019.
Edition
First edition.
Physical Desc
xxii, 216 pages ; 24 cm
Language
English
Description
"A former head of CIA's Russia analysis shows how Washington and Moscow may be headed toward nuclear annihilation. After years of unsuccessful post-Cold War efforts to forge a cooperative relationship, it is now clear that the U.S. and Russia have become competitors, not partners--no matter what some politicians would have the American public believe. And this competition is quickly spiraling into enmity thanks to new strategic weapons, shifts in...
Author
Series
Peter Rena and Randi Brooks volume 4
Language
English
Formats
Description
Billionaire entrepreneur and President of the U.S., David Traynor calls upon ruthless DC fixers Peter Rena and Randi Brooks, who must help him salvage American politics while dealing with cyberattacks and a world on the cusp of enormous change.
In Interlibrary Loan
Didn't find what you need? Items not owned by Salina Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request