Catalog Search Results
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Appears on list
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Language
English
Description
When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls its head cryptographer, Susan Fletcher, a brilliant mathematician. What she uncovers sends shock waves throughout the corridors of power. On hearing the National Security Agency has secretly installed a program that can read anyone's e-mail, Ensei Tankado comes up with a program to paralyze it.
3) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
4) Snowden
Language
English
Formats
Description
The incredible untold story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world. He is considered a hero by some, and a traitor by others.
Author
Language
English
Appears on list
Description
"A simple mix up throws one innocent man into the crosshairs of sinister government secrets and ruthless political ambitions in New York Times bestselling author Joseph Finder's timely, electrifying new thriller. Michael Tanner is on his way home from a business trip when he accidentally picks up the wrong MacBook in an airport security line. He doesn't notice the mix-up until he arrives home in Boston, but by then it's too late. Tanner's curiosity...
Author
Series
Pike Logan thrillers volume 17
Language
English
Appears on these lists
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
Author
Language
English
Description
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high risk physical trespassing: the original 'hacking.' Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a...
Author
Series
Language
English
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
Author
Language
English
Description
"Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
11) Sneakers
Language
English
Formats
Description
"Computer expert Martin Bishop heads a team of renegade hackers -- including a former CIA employee, a gadgets wizard, a young genius and a blind soundman -- who are routinely hired to test security systems. But Bishop's past comes back to haunt him when government agents blackmail the 'sneakers' into carrying out a covert operation: tracking down an elusive black box. Along with his former girlfriend, Bishop's team retrieves the box and make a stunning...
Author
Language
English
Formats
Description
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at any time, targeting you through a laptop, a smartphone, a television -- even your doorbell or thermostat. The good news? You don't have to be a victim. In this comprehensive, practical, and fact-filled book, global security expert Nick Selby and futurist...
Author
Language
English
Formats
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Author
Language
English
Description
"An introduction to cybersecurity for readers new to the field. It covers the fundamentals of cybersecurity and shares practical advice on how readers can keep themselves and their computers safe from phishing, malware, network attacks, and other hacker exploits. Provides real-world examples"--
Author
Language
English
Description
An accessible introduction to cybersecurity concepts and practices
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires
...Author
Language
English
Formats
Description
Spying has never been more ubiquitous-or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Language
English
Formats
Description
"Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge-- and he teaches you "the art of invisibility." Mitnick is the...
Author
Language
English
Description
"Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development...
Author
Language
English
Formats
Description
If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy-the author who made "hackers" a household word-comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"-nerds and visionaries turned freedom fighters-teamed up with corporate interests to...
Author
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request