Catalog Search Results
Author
Series
Mortality doctrine volume 1
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secret's out"--
Author
Formats
Description
From the bestselling author of Black Hawk Down, the gripping story of the Conficker worm—the cyberattack that nearly toppled the world.
The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became...
The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became...
3) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
As always, Reacher has no particular place to go, and all the time in the world to get there. One morning he ends up in a town near Pleasantville, Tennessee. But there's nothing pleasant about the place. In broad daylight Reacher spots a hapless soul walking into an ambush. 'It was four against one' so Reacher intervenes, with his own trademark brand of conflict resolution. The man he saves is Rusty Rutherford, an unassuming IT manager, recently fired...
Author
Series
Mortality doctrine volume 2
Formats
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--
5) Skinner
Author
Formats
Description
"Skinner founded his career in "asset protection" on fear. To touch anyone under his protection was to invite destruction. A savagely effective methodology, until Skinner's CIA handlers began to fear him as much as his enemies did and banished him to the hinterlands of the intelligence community. Now, an ornate and evolving cyber-terrorist attack is about to end that long exile. His asset is Jae, a roboticist with a gift for seeing the underlying...
Author
Series
Oregon files volume 11
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
Author
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Series
Mortality doctrine volume 3
Publisher
Delacorte Press
Pub. Date
[2015]
Description
The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day. If Kaine succeeds, it will mean worldwide cyber domination. And it looks like Michael and his friends are the only ones who can put the monster back in the box--if Michael can figure out who his friends really are.
Author
Pub. Date
2014.
Description
"Chilling . . . Extraordinary and urgent." - Washington Post
"Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors." - Los Angeles Times
"Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure." - Christian Science Monitor
The wars of the future are already being fought...
10) Hunt the dragon
Author
Series
Pub. Date
2016.
Formats
Description
"Hackers from the North Korean government are one click away from obtaining black market nuclear weapons. Only the heroes of SEAL Team Six can stop them. In Don Mann and Ralph Pezzullo's newest novel, Captain Thomas Crocker and Mancini of SEAL Team Six's Black Cell are in Las Vegas after conducting a training exercise in the desert with new members of the team. Lounging by the pool at Caesar's Palace, they witness an argument between hotel security...
Author
Formats
Description
In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Series
Formats
Description
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers,...
Pub. Date
[2019]
Appears on list
Formats
Description
The UK is in peril. Five days before the PM is to host her first G12 summit, MI7's security is breached and every agent in the field identified and exposed. The only hope of finding the perpetrator is to bring an agent out of retirement, but with most of them either dead or close to it, the head of MI7 is left with only one choice, and his name is English.
Author
Pub. Date
2018.
Formats
Description
A critique of the forces threatening the American intelligence community, beginning with President Trump himself, outlines how the country's democratic structures and processes are under stress and discusses effective responses.
"In the face of a President who lobs accusations without facts, evidence, or logic, truth tellers are under attack. Meanwhile, the world order is teetering on the brink. North Korea is on the verge of having a nuclear weapon...
15) MindWar
Author
Series
MindWar trilogy volume 1
Publisher
Thomas Nelson
Appears on list
Formats
Description
"Rick's high school football team couldn't be stopped when he was leading them as their quarterback. He was going to Syracuse on a scholarship. But then his dad abandoned them and a terrible accident left him crippled. Certain his old life is completely lost, Rick spends months hiding away in his room playing video games. He achieves the highest scores on so many games that he's approached by a government agency who claims to be trying to thwart a...
16) The Fox
Author
Description
"Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Publisher
PublicAffairs
Formats
Description
"The internet today connects roughly 2.7 billion people around the world, and booming interest in the "internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization and ownership of information. In A Hacked...
Author
Series
Pub. Date
2019.
Formats
Description
A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into...
19) Price of duty
Author
Series
Description
In a top-secret location deep in the Ural Mountains, Russian President Gennadiy Gryzlov has built his nation's most dangerous weapon since the atomic bomb--a fearsome tool to gain superiority in Russia's long-running battle with the West. From inside Perun Aerie--an intricate network of underground tunnels and chambers that is the heart of the Russian cyber warfare program--he is launching a carefully plotted series of attacks on an unsuspecting U.S....
Author
Series
Pike Logan thrillers volume 17
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...