|
Cyber Infrastructure Protection
|
Tarek Nazir Saadawi,Louis Jordan, Jr. |
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a r… |
OL15748468W |
|
Law, policy and technology
|
Eduardo Gelbstein,Pauline C. Reich |
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on c… |
OL16499595W |
|
Early warning
|
Walsh, Michael |
"The NSA's most lethal weapon is back. Code-named Devlin, he operates in the darkest recesses of the US government. When international cyber-terrorists allow a deadly and cunning band of radical insu… |
OL16629532W |
|
The cloud collector
|
Brian Freemantle |
When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant Briti… |
OL17887215W |
|
Fall
|
Rod Rees |
For thousands of years the Grigori have lain hidden, dreaming of the day when they will emerge from the darkness. Now that day draws close. Norma, Trixie and Ella fight doggedly to frustrate these pl… |
OL18145011W |
|
Securing the information infrastructure
|
Joseph Migga Kizza |
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence t… |
OL1911927W |
|
The cyber attack survival manual
|
Selby, Nick (Police detective) |
"Identity theft. Email hacks. Infrastructure attacks. Credit card fraud. Even murder for hire. All of these crimes can be committed with just a few clicks of a mouse. Cyber criminals can attack at an… |
OL19726345W |
|
Inside the enemy's computer
|
Clement Guitton |
Attribution -- tracing those responsible for a cyber attack -- is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate curren… |
OL19754432W |
|
The Moscow sleepers
|
Stella Rimington |
"A Russian immigrant lies dying in a hospice in upstate Vermont. When a stranger visits, claiming to be a childhood friend, the FBI is alerted and news quickly travels to MI5 in London. Liz Carlyle … |
OL19763793W |
|
Digital winter
|
Mark Hitchcock |
Twenty-two-year-old savant Donny Elton can't tie his shoes, but his computer skills are unsurpassed. Egged on by a shadowy figure only he can see and hear, Donny creates an evolving computer virus th… |
OL19960635W |
|
Lights out
|
Ted Koppel |
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, n… |
OL20008564W |
|
Terms of use
|
Scott Allan Morrison |
Circles is the most popular social network in the world: vast, ubiquitous, and constantly evolving. Days before expanding into China, Circles suffers a devastating cyberattack--and a key executive is… |
OL20022416W |
|
Bounty
|
Michael Byrnes |
When a website begins putting lucrative bounties on the heads of global criminals who have evaded justice--including Wall Street power brokers, politicians, and unethical businesspeople--a group of e… |
OL20035739W |
|
Ghost in the Shell
|
James Swallow,Abbie Bernstein |
234 pages ; 21 cm |
OL20802287W |
|
The trusted
|
John M. Green |
Imagine a global depression caused, not by greed or stupidity, but by a secret band of brilliant and radical environmentalists, 9S, using cyber-terror to slash the world's population and smash its re… |
OL24304638W |
|
Conquest in Cyberspace
|
Martin C. Libicki |
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyb… |
OL2664229W |
|
Situation room
|
Jack Mars |
"A cyberattack on an obscure U.S. dam leaves thousands dead and the government wondering who attacked it, and why. When they realize it is just the tip of the iceberg--and that the safety of all of A… |
OL27297968W |
|
The loyal nine
|
Bobby Akart |
With social unrest sweeping the country, Europe on the brink of war and the U.S. economy under siege by foreign nations, a new threat emerges. The nation is caught in the crosshairs of a power strugg… |
OL29317925W |
|
Knowledge reuse and agile processes
|
Amit Mitra |
"This book addresses flexibility of both business and information systems through component technology at the nexus of three seemingly unrelated disciplines: service-oriented architecture, knowledge … |
OL4425003W |
|
Managerial guide for handling cyber-terrorism and information warfare
|
Lech Janczewski |
"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher. |
OL5719060W |