Catalog Search Results
Author
Formats
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
4) The Fox
Author
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Formats
Description
Michael completed the Path. What he found at the end turned everything he'd ever known about his life completely upside down. He thought he'd been helping VirtNet Security to track down the cyber-terrorist Kaine. He thought the VirtNet would be safe for gamers once more. But the truth is more terrifying than he could ever have imagined. Kaine is in fact a Tangent, a computer program that has come alive. And Kaine's master plan is to populate the earth...
Author
Description
When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant British MI5 agent whose parents were massacred in a terrorist ambush, is seconded to the CIA task force to hunt the Iranian mastermind through Al Qaeda's intricately coded use of social media and the Internet. Jack Irvine is NSA's guilt-burdened code-cracker--it...
Author
Formats
Description
"A Russian immigrant lies dying in a hospice in upstate Vermont. When a stranger visits, claiming to be a childhood friend, the FBI is alerted and news quickly travels to MI5 in London. Liz Carlyle and her colleague Peggy Kinsolving are already knee-deep in conspiracies, and as they unravel the events that landed the man in the hospital, Liz learns of a network of Russians and their plot to undermine the German government. Liz and Peggy set out to...
Author
Formats
Description
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers,...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request