Catalog Search Results
1) The sentinel
Author
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
2) Zero days
Author
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Pub. Date
2015.
Language
English
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Author
Language
English
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
Author
Language
English
Description
A computer whiz takes on the government in defense of the right to privacy. On hearing the National Security Agency has secretly installed a program that can read anyone's e-mail, Ensei Tankado comes up with a program to paralyze it. A conflict ensues and people die.
Author
Language
English
Description
"The president's new cybersecurity team, Net Force, is up and running. But a political deadlock in Washington makes the young agency dangerously vulnerable to the criminals, terror groups and hostile governments who would use the digital space to advance their destructive goals. In Central Europe, an unknown enemy mounts a crippling high-tech assault against the organization's military threat-response unit on its home base. The strike casts suspicion...
8) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2022.
Edition
First edition.
Physical Desc
355 pages ; 24 cm.
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Author
Publisher
W.W. Norton & Company
Language
English
Description
Your cell phone provider tracks your location and knows who's with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you're thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it. The powers that surveil us do more than simply store...
11) Attack surface
Author
Language
English
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Language
English
Description
The moment you check your phone in the morning you are giving away data. Before you've even switched off your alarm, a whole host of organizations have been alerted to when you woke up, where you slept, and with whom. As you check the weather, scroll through your 'suggested friends' on Facebook, you continually compromise your privacy. Without your permission, or even your awareness, tech companies are harvesting your information, your location, your...
14) Hush-hush
Author
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
16) First strike
Author
Language
English
Description
"The violent terrorist group ISIS has launched a major military campaign to take over Syria. But as they commit more and more public atrocities, their sources for ammunition are drying up. However, their charismatic and tyrannical leader, Tristan Nazir, has a major card left to play, which will get a new secret shipment of arms underway. Dewey Andreas is sent into the field to meet Mallory, the Milan CIA station chief who has explosive proof about...
Author
Language
English
Description
Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. When a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and hopefully save lives. Diplomatic Security Services special agent Alex...
18) Zero days
Publisher
Magnolia Home Entertainment
Pub. Date
[2017]
Physical Desc
1 videodisc (approximately 114 min.) : sound, color ; 4 3/4 in.
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
Author
Language
English
Description
"Chertoff [posits] that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be ... overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly...
In Clover
Didn't find what you need? Items not owned by VOKAL can be requested from other Clover libraries to be delivered to your local library for pickup.
Make a purchase suggestion
Can't find what you are looking for? Try our Materials Request Service. Submit Request