Catalog Search Results
Author
Pub. Date
[2018]
Description
Awakening from a dream with more than one hundred predictions about the future in his head, an unassuming Manhattan bassist becomes one of the world's most powerful men and hides his identity behind an online persona that is targeted by greedy corporations and dangerous enemies.
Author
Pub. Date
2018.
Description
Three initiatives integrate cyber security resources to protect Colorado elections: 1) Securing the statewide voter registration system; 2) Securing overseas and military ballot return with encryption; 3) Colorado threat information sharing and joint fusion center. These initiatives make Colorado one of the safest states to cast a ballot resulting in one of the highest voter turnout.
Author
Pub. Date
2016.
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
6) Raptor 6
Author
Series
Quiet professionals volume 1
Pub. Date
[2014]
Description
Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because...
Author
Pub. Date
[2022]
Description
"Longlisted for the Airey Neave Book Prize, Airey Neave Trust" Amy Zegart is senior fellow at the Hoover Institution and the Freeman Spogli Institute for International Studies at Stanford University and a contributing writer at The Atlantic. Her books include Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton) and (with Condoleezza Rice) Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity. She lives in...
9) Hawk
Author
Series
Quiet professionals volume 2
Pub. Date
[2014]
Description
Raptor's communications expert, Staff Sergeant Brian "Hawk" Bledsoe, is struggling with his inner demons, leaving him on the verge of an "other than honorable" discharge. Plagued with corrupted intel, Raptor team continues to track down the terrorist playing chess with their lives. Afghan pilot Fekiria Haidary is devastated when a systems glitch on her aircraft forces a weapons launch on a safe target. And when the deadly bombing separates Hawk from...
10) Falcon
Author
Series
Quiet professionals volume 3
Pub. Date
2015
Description
Special Forces operator Salvatore "Falcon" Russo vowed to never again speak to or trust Lieutenant Cassandra Walker after a tragedy four years ago. But as Raptor closes in on the cyber terrorists responsible for killing two of their own, Sal must put his life-- and the lives of his teammates-- in her hands. Cassie is ill-prepared for Falcon's resistance and the fallout. As allies become enemies and hostiles become unlikely partners, Raptor fights...
Author
Series
Pub. Date
[2023]
Description
"The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about...
Author
Series
Pub. Date
[2013]
Description
Cyberspace is the 21st century's greatest engine of change. Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Cybersecurity expert and professor Paul Rosenzweig delivers your guide to understanding the intricate nature...