Books

20+ results found
Title Authors Description OpenBook ID
Cyber Infrastructure Protection Cyber Infrastructure Protection Tarek Nazir Saadawi,Louis Jordan, Jr. This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a r… OL15748468W
Law, policy and technology Law, policy and technology Eduardo Gelbstein,Pauline C. Reich "This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on c… OL16499595W
Early warning Early warning Walsh, Michael "The NSA's most lethal weapon is back. Code-named Devlin, he operates in the darkest recesses of the US government. When international cyber-terrorists allow a deadly and cunning band of radical insu… OL16629532W
The cloud collector The cloud collector Brian Freemantle When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant Briti… OL17887215W
Fall Fall Rod Rees For thousands of years the Grigori have lain hidden, dreaming of the day when they will emerge from the darkness. Now that day draws close. Norma, Trixie and Ella fight doggedly to frustrate these pl… OL18145011W
Securing the information infrastructure Securing the information infrastructure Joseph Migga Kizza "This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence t… OL1911927W
The cyber attack survival manual The cyber attack survival manual Selby, Nick (Police detective) "Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at an… OL19726345W
Inside the enemy's computer Inside the enemy's computer Clement Guitton Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate curren… OL19754432W
The Moscow sleepers The Moscow sleepers Stella Rimington "A Russian immigrant lies dying in a hospice in upstate Vermont. When a stranger visits, claiming to be a childhood friend, the FBI is alerted and news quickly travels to MI5 in London. Liz Carlyle … OL19763793W
Digital winter Digital winter Mark Hitchcock Twenty-two-year-old savant Donny Elton can't tie his shoes, but his computer skills are unsurpassed. Egged on by a shadowy figure only he can see and hear, Donny creates an evolving computer virus th… OL19960635W
Lights out Lights out Ted Koppel Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, n… OL20008564W
Terms of use Terms of use Scott Allan Morrison Circles is the most popular social network in the world: vast, ubiquitous, and constantly evolving. Days before expanding into China, Circles suffers a devastating cyberattack--and a key executive is… OL20022416W
Bounty Bounty Michael Byrnes When a website begins putting lucrative bounties on the heads of global criminals who have evaded justice--including Wall Street power brokers, politicians, and unethical businesspeople--a group of e… OL20035739W
Ghost in the Shell Ghost in the Shell James Swallow,Abbie Bernstein 234 pages ; 21 cm OL20802287W
The trusted The trusted John M. Green Imagine a global depression caused, not by greed or stupidity, but by a secret band of brilliant and radical environmentalists, 9S, using cyber-terror to slash the world's population and smash its re… OL24304638W
Conquest in Cyberspace Conquest in Cyberspace Martin C. Libicki With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyb… OL2664229W
Situation room Situation room Jack Mars "A cyberattack on an obscure U.S. dam leaves thousands dead and the government wondering who attacked it, and why. When they realize it is just the tip of the iceberg--and that the safety of all of A… OL27297968W
The loyal nine The loyal nine Bobby Akart With social unrest sweeping the country, Europe on the brink of war and the U.S. economy under siege by foreign nations, a new threat emerges. The nation is caught in the crosshairs of a power strugg… OL29317925W
Knowledge reuse and agile processes Knowledge reuse and agile processes Amit Mitra "This book addresses flexibility of both business and information systems through component technology at the nexus of three seemingly unrelated disciplines: service-oriented architecture, knowledge … OL4425003W
Managerial guide for handling cyber-terrorism and information warfare Managerial guide for handling cyber-terrorism and information warfare Lech Janczewski "This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher. OL5719060W
Next page