Books

20+ results found
Title Authors Description OpenBook ID
Rootkit arsenal Rootkit arsenal Bill Blunden While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothol… OL16318402W
The Joker virus The Joker virus Scott Peterson The Joker has created a virus that infects the latest videogame craze, and turns players into zombies--but in order to defeat him Batman must first discover where he is hiding with the kidnapped crea… OL16499411W
Practical Malware Analysis Practical Malware Analysis Michael Sikorski,Andrew Honig Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring… OL16509463W
Worm Worm Mark Bowden Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide.… OL16524128W
Anarchy Anarchy James Treadwell When an accused murderer disappears from a locked cell on her watch, Corporal "Goose" Maculloch of the Royal Canadian Mounted Police tracks the vanished girl through the wilderness of Vancouver Islan… OL17698526W
Amnesia Amnesia Peter Carey When Gaby Baillieux releases the Angel Worm into Australia's prison computer system, hundreds of asylum-seekers walk free. And because the Americans run the prisons, the doors of some five thousand j… OL17726207W
The quantum deception The quantum deception Denver Acey "Reformed cyber hacker Tanner Stone has been living a peaceful life in Utah. But all that changes when a plane mysteriously crashes into the mountains and Tanner links the 'accident' to an ingenious … OL17874932W
Phantom Wheel Phantom Wheel Tracy Deebs Believing they have been recruited by the CIA, six teen hackers arrive in LA for a hacking aptitude test with the promise of a college scholarship and a job with the CIA after graduation. But one of … OL19761534W
The hive construct The hive construct Alexander Maskill "Situated deep in the Sahara Desert, New Cairo is a city built on technology--from the huge, life-giving solar panels that keep it functioning in a radically changed, resource-scarce world to the art… OL20020087W
Mona Mona Dan T. Sehlberg Eric Söderqvist, professor of computer science at the Royal Institute of Technology in Stockholm, has invented Mind Surf, a thought-control system that allows people with disabilities to browse the w… OL20230657W
Bigelow's virus troubleshooting pocket reference Bigelow's virus troubleshooting pocket reference Ken Dunham Identify, Diagnose and Combat Computer Viruses Now! With the growing number of viruses infecting computers—and an increasing level of damage—safeguarding your system has never been more important tha… OL225240W
Tracy Tam Tracy Tam Krystalyn Drown "Tracy Tam doesn't believe in Santa Claus and thinks there's a scientific explanation for how all those presents show up on Christmas Eve and boys and girls around the world end up with exactly what … OL24303614W
Computer Viruses and Malware Computer Viruses and Malware John Aycock 1 v. : 24 cm OL25615513W
Aftermath II Aftermath II L. M. Edmondson A world-changing event has taken place and with seventy percent of the world’s population believed to be dead, the first winter after IT happened will prove to be a bigger challenge to survive than t… OL26194622W
Meltdown (Special Agents, #6) Meltdown (Special Agents, #6) Sam Hutton **A hidden enemy with a deadly game...** PIC trainee Maddie Cooper finds herself falsely accused of drug dealing and suspended from duty. Her team mates Danny and Alex are horrified and get to wor… OL263683W
Cyber patrol Cyber patrol Robert Cutting Mark Lewis is a 12 year old expert at online games. When a powerful and mysterious computer virus strikes, the authorities come asking for Mark's help. Who will win - Cyper Patrol or CyberDoom? OL27061681W
Worm Worm Mark Bowden Worm: The First Digital World War tells the story of the Conficker worm, a potentially devastating piece of malware that has baffled experts and infected more than twelve million computers worldwide.… OL28600669W
Snow Crash Snow Crash Neal Stephenson Within the Metaverse, Hiro is offered a datafile named Snow Crash by a man named Raven who hints that it is a form of narcotic. Hiro's friend and fellow hacker Da5id views a bitmap image contained in… OL38501W
The case of the killer bugs The case of the killer bugs Jay Montavon Certain versions of the video game "Insect Invaders" contain a deadly virus that fries out hard drives. Who created the virus and why? It's up to you and the Digital Detectives to find out. OL4617049W
Computer viruses for dummies Computer viruses for dummies Peter H. Gregory Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyber… OL5894755W
Next page