Search:

The rule of thoughts / by Dashner, James,1972-;
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--Provided by publisher.LSC
Subjects: Science fiction.; Computer games; Virtual reality; Cyberterrorism; Terrorism;
Available copies: 1 / Total copies: 1
unAPI

Zero hour / by McNab, Andy.;
LSC
Subjects: Suspense fiction.; Adventure fiction.; Stone, Nick (Fictitious character); Intelligence officers; Terrorism; Cyberterrorism;
© 2010., Corgi Books,
Available copies: 1 / Total copies: 1
unAPI

The children's game [sound recording] : a thriller / by Karpov, Max,author.; McLaren, Todd Parker,narrator.; Brilliance Audio (Firm),publisher.;
Read by Todd McLaren.
Subjects: Thrillers (Fiction); Audiobooks.; United States. Central Intelligence Agency; Cyberterrorism; Propaganda;
Available copies: 1 / Total copies: 1
unAPI

Price of duty / by Brown, Dale,1956-author.;
Subjects: Thrillers (Fiction); Political fiction.; McLanahan, Patrick (Fictitious character); Cyberterrorism;
Available copies: 1 / Total copies: 2
unAPI

Moving target : a novel / by Preisler, Jerome.; Clancy, Tom,1947-2013.; Pieczenik, Steve R.;
To prevent global chaos, Net Force agent Kali Alcazar, a member of America's elite cyber-defense organization, leads a final strike against the world's most dangerous hacker, discovering too late that he has prepared a deadly trap for them all.
Subjects: Political fiction.; Thrillers (Fiction); Cyber intelligence (Computer security); Cyberterrorism; National security; Adventure stories;
Available copies: 1 / Total copies: 1
unAPI

The Russia trap : how our shadow war with Russia could spiral into nuclear catastrophe / by Beebe, George,author.;
Includes bibliographical references and index."A former head of CIA's Russia analysis shows how Washington and Moscow may be headed toward nuclear annihilation. After years of unsuccessful post-Cold War efforts to forge a cooperative relationship, it is now clear that the U.S. and Russia have become competitors, not partners--no matter what some politicians would have the American public believe. And this competition is quickly spiraling into enmity thanks to new strategic weapons, shifts in world power, and unsettled regional conflicts. Meanwhile, the rules that kept the Cold War from getting hot no longer apply. The inherent advantages of cyber attackers over cyber defense are incentivizing aggression and fueling feelings of vulnerability. And the arms control regimes and deterrence strategies that once contained dangers are ironically stoking mistrust between the U.S. and Russia. Americans don't worry about nuclear war the way they did thirty years ago. But they should because the danger has become even greater today. Beebe's terrifying but essential new work allows us to face this reality--and, in doing so, to take steps to divert the world from this path."--Provided by publisher.
Subjects: Cyberterrorism; Nuclear warfare; Nuclear crisis control.; Geopolitics.;
Available copies: 1 / Total copies: 1
unAPI

The sentinel / by Child, Lee,author.; Child, Andrew,author.;
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury--and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher"--
Subjects: Thrillers (Fiction); Reacher, Jack (Fictitious character); Retired military personnel; Cyberterrorism; Computer security; Murder;
Available copies: 2 / Total copies: 4
unAPI

The sentinel [sound recording] / by Child, Lee,author.; Brick, Scott,narrator.; Child, Andrew,author.; Random House Audio Publishing,publisher.;
Read by Scott Brick."It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury--and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher"--
Subjects: Thrillers (Fiction); Audiobooks.; Reacher, Jack (Fictitious character); Computer security; Cyberterrorism; Murder; Retired military personnel;
Available copies: 1 / Total copies: 1
unAPI

Clive Cussler's Dark vector [text (large print)] : a novel from the NUMA files / by Brown, Graham,1969-author.; Cussler, Clive,creator.;
PREVIOUS BOOK IN SERIES: FAST ICE, ISBN 9780593395615. Kurt Austin and his NUMA team must unravel a new mystery in the 19th thriller in the 'NUMA Files' series.
Subjects: Thrillers (Fiction); Large type books.; Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 1 / Total copies: 1
unAPI

Clive Cussler's Dark vector : a novel from the NUMA files / by Brown, Graham,1969-author.; Cussler, Clive,creator.;
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 2 / Total copies: 2
unAPI