Catalog Search Results
Author
Formats
Description
"Lucas [examines the cybercrime] confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the Internet, it might as well be the Wild West. Standards of securing our computers and other Internet-connected technology are diverse, but just like the rules...
Author
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
4) Warcross
Author
Appears on list
Description
Teen hacker Emika Chen works as a bounty hunter, tracking down Warcross players who bet on the game illegally. To earn some quick cash, Emika hacks into the game -- only to glitch herself into the action and become an overnight sensation. When Emika gets a call from the game's creator, the young billionaire Hideo Tanaka, he makes her an offer she can't refuse, and suddenly Emika's whisked off to Tokyo into a world of fame and fortune. But the more...
5) Chat
Author
Description
"When a wintertime car accident leaves his mother and brother seriously injured, Joe Gunther takes a leave of absence to attend to them and investigate the cause of the crash"--Provided by publisher.
6) Wired
Author
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Formats
Description
"This extraordinarily powerful book demonstrates how utterly we lack the shared supranational tools needed to fight cybercrime. Essential reading." —Roberto Saviano, author of Gommorah
The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a law enforcer’s nightmare and every criminal’s dream. We bank online; shop online; date, learn, work and live online. But...
The benefits of living in a digital, globalized society are enormous; so too are the dangers. The world has become a law enforcer’s nightmare and every criminal’s dream. We bank online; shop online; date, learn, work and live online. But...
Author
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
9) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
13) Wildcard
Author
Appears on list
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
Author
Description
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier...
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
18) Dark angel
Author
Appears on list
Description
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more...
19) Corsair
Author
Description
"In the early 2020s, two young, genius computer hackers, Elizabeth Santiago and David Schwartz, meet at MIT, where Schwartz is sneaking into classes, and have a brief affair. David is amoral and out for himself, and soon disappears. Elizabeth dreams of technology and space travel and takes a military job after graduating. Nearly ten years later, David is setting himself to become a billionaire by working in the shadows ... and Elizabeth works in intelligence...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request