Catalog Search Results
eBooks and videos covering data, design, hardware, security, business, and more.
Author
Publisher
Twenty-First Century Books
Pub. Date
[2021]
Language
English
Formats
Description
"As the digital world grows, teens must be aware of threats to their online privacy and security. This book details forms of cyberspying, explores careers in cyberintelligence, and looks at various online threats"--
Author
Publisher
Princeton University Press
Pub. Date
Not Supplied
Language
English
Appears on these lists
Global Security and Intelligence Recommendations
How Did We Get Here? History Picks
Topics in Terrorism
How Did We Get Here? History Picks
Topics in Terrorism
Description
Spying has never been more ubiquitous--or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. Amy Zegart separates fact from fiction as she offers an engaging...
Author
Publisher
Harvard University Press
Pub. Date
2020.
Language
English
Appears on list
Description
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
12) The director
Author
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
"Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
13) Falcon
Author
Series
Quiet professionals volume 3
Publisher
Shiloh Run Press
Pub. Date
[2015]
Language
English
Description
Special Forces operator Salvatore "Falcon" Russo vowed to never again speak to or trust Lieutenant Cassandra Walker after a tragedy four years ago. But as Raptor closes in on the cyber terrorists responsible for killing two of their own, Sal must put his life-- and the lives of his teammates-- in her hands. Cassie is ill-prepared for Falcon's resistance and the fallout. As allies become enemies and hostiles become unlikely partners, Raptor fights...
14) Raptor 6
Author
Series
Quiet professionals volume 1
Publisher
Shiloh Run Press
Pub. Date
2014.
Language
English
Description
Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because...
15) Hawk
Author
Series
Quiet professionals volume 2
Publisher
Shiloh Run Press
Pub. Date
[2014]
Language
English
Description
Raptor's communications expert, Staff Sergeant Brian "Hawk" Bledsoe, is struggling with his inner demons, leaving him on the verge of an "other than honorable" discharge. Plagued with corrupted intel, Raptor team continues to track down the terrorist playing chess with their lives. Afghan pilot Fekiria Haidary is devastated when a systems glitch on her aircraft forces a weapons launch on a safe target. And when the deadly bombing separates Hawk from...
Author
Series
Publisher
ReferencePoint Press
Pub. Date
[2023]
Language
English
Description
"The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about...
Author
Publisher
Crown
Pub. Date
[2019]
Language
English
Description
"A cybersecurity expert and former FBI "ghost" tells the thrilling story of how he helped take down notorious FBI mole Robert Hanssen, the first Russian cyber spy. Eric O'Neill was only twenty-six when he was tapped for the case of a lifetime: a one-on-one undercover investigation of the FBI's top target, a man suspected of spying for the Russians for nearly two decades, giving up nuclear secrets, compromising intelligence, and betraying US assets....
Publisher
The Council of Economic Advisers, Executive Office of the President of the United States
Pub. Date
2018.
Language
English
Description
This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are ever-evolving and may come from sophisticated adversaries. Due to common vulnerabilities, instances of security breaches occur across firms and in patterns that are difficult to anticipate. Importantly, cyberattacks and cyber theft impose externalities that may lead to rational underinvestment in cybersecurity by the private...