Catalog Search Results
Author
Formats
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Author
Formats
Description
From the bestselling author of Black Hawk Down, the gripping story of the Conficker worm—the cyberattack that nearly toppled the world.
The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became...
The Conficker worm infected its first computer in November 2008, and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks—including British Parliament and the French and German military—became...
Author
Publisher
Doubleday
Pub. Date
[2019]
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Author
Publisher
Atlantic Monthly Press
Pub. Date
c2011
Description
This book is a cyber-crime story that explores the Conficker Computer "Worm," a potentially devastating computer virus that has baffled experts and infected as many as 12 million computers to date. It is about the next frontier in terrorism. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. The worm, exploiting the security flaws in Microsoft Windows, grew at an astonishingly...
10) Ghost Ship
Author
Series
Description
When NUMA team leader Kurt Austin finds his own memories of a dangerous mission aren't to be trusted, he must follow a trail of mysterious disppearances to the truth in this novel in the #1 New York Times-bestselling series.
After a narrow escape during a perilous rescue operation to save the passengers and crew from a sinking yacht, Marine adventurer Kurt Austin awakens with fragmented and conflicting memories. Did...
After a narrow escape during a perilous rescue operation to save the passengers and crew from a sinking yacht, Marine adventurer Kurt Austin awakens with fragmented and conflicting memories. Did...
Publisher
Kanopy Streaming
Pub. Date
2015.
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
12) Chat
Author
Series
Joe Gunther mysteries volume 18
Formats
Description
"When a wintertime car accident leaves his mother and brother seriously injured, Joe Gunther takes a leave of absence to attend to them and investigate the cause of the crash"--Provided by publisher.
Author
Publisher
BenBella Books, Inc
Pub. Date
[2021]
Description
"From cybersecurity expert and former CIA hacker Eric Cole, Cyber Crisis explains why cybersecurity should be the top concern for all professionals and offers actionable advice that anyone can implement on regular basis for increased safety and protection."-- Provided by publisher.
14) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2022.
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime."-- Provided by publisher.
15) Wildcard
Author
Series
Warcross volume 2
Description
"Emika Chen barely made it out of the Warcross Championships alive. Now that she knows the truth behind Hideo's new NeuroLink algorithm, she can no longer trust the one person she's always looked up to, who she once thought was on her side. Determined to put a stop to Hideo's grim plans, Emika and the Phoenix Riders band together, only to find a new threat lurking on the neon-lit streets of Tokyo. Someone's put a bounty on Emika's head, and her sole...
16) Warcross
Author
Series
Warcross volume 1
Appears on these lists
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire."-- Provided by publisher.
From #1 New York Times bestselling author Marie Lu. When a game called Warcross takes the world by storm, one girl hacks her way into its dangerous depths. For the millions who log in every day, Warcross...
17) Dark angel
Author
Series
Letty Davenport novels volume 2
Description
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers."-- Provided by publisher.
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect...
Author
Series
Description
"The dazzling new novel in the #1 New York Times-bestselling series from Clive Cussler, the grand master of adventure. When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown, or was the yacht abandoned when he came aboard? For reasons he cannot explain, Kurt doesn't trust either version of his recollection. Determined...
Author
Pub. Date
2014.
Description
"Chilling . . . Extraordinary and urgent." - Washington Post
"Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors." - Los Angeles Times
"Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure." - Christian Science Monitor
The wars of the future are already being fought...
20) Terminal black
Author
Series
Pub. Date
2019.
Formats
Description
"Harry Tate has one rule: you don't abandon your friends. When he learns that former colleague Rik Ferris has had a breakdown and disappeared, allegedly in possession of highly sensitive secrets from MI6's archives, he agrees to look for him and, if possible, bring him back in. But where to begin? Rik could be anywhere in the world. All Harry knows is, if he doesn't find Rik, others will be sent out instead. And they won't play by the same rules....