Catalog Search Results
2) The minders
Author
Appears on list
Description
"The new high concept thriller from the author of The Passengers and the word-of-mouth sensation The One, soon to be a Netflix original series. In the 21st century, information is king. But computers can be hacked and files can be broken into - so a unique government initiative has been born. Five ordinary people have been selected to become "minders" - the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure,...
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Author
Formats
Description
NOW AN HBO® DOCUMENTARY FROM AWARD-WINNING DIRECTOR JOHN MAGGIO • “An important—and deeply sobering—new book about cyberwarfare” (Nicholas Kristof, New York Times), now updated with a new chapter.
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to...
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to...
5) The sentinel
Author
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Description
The UK is in peril. Five days before the PM is to host her first G12 summit, MI7's security is breached and every agent in the field identified and exposed. The only hope of finding the perpetrator is to bring an agent out of retirement, but with most of them either dead or close to it, the head of MI7 is left with only one choice, and his name is English.
Author
Description
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day....
11) The fox
Author
Appears on list
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Description
"When the coding club finds that their app has a malicious user, Morgan, Zoey, and Daniel code an update to contend with a mischievous AI llama that's guiding a not-so-popular kid named Marcus to cause chaos in the school. Annoying little siblings, chaotic pranks, and more abound as they race to repair the glitchy app--and their own friendships--in their school before the damage is irreversible"--
Author
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Description
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information...
17) The eye of minds
Author
Appears on list
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secret's out"--
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request