Catalog Search Results
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Formats
Description
Michael completed the Path. What he found at the end turned everything he'd ever known about his life completely upside down. He thought he'd been helping VirtNet Security to track down the cyber-terrorist Kaine. He thought the VirtNet would be safe for gamers once more. But the truth is more terrifying than he could ever have imagined. Kaine is in fact a Tangent, a computer program that has come alive. And Kaine's master plan is to populate the earth...
Author
Formats
Description
NEW YORK TIMES BESTSELLER • Ted Koppel reveals that a major cyberattack on America’s power grid is not only possible but likely, that it would be devastating, and that the United States is shockingly unprepared.
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
“Fascinating, frightening, and beyond timely.”—Anderson Cooper
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For...
Author
Description
Journalist Mark Bowden delivers a look at the ongoing and largely unreported war taking place literally beneath our fingertips. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. Was it a platform for criminal profit, or a weapon? The worm, exploiting security flaws in Microsoft Windows, grew at an astonishing rate, infecting millions of computers around the world within...
Author
Description
When Western intelligence services recognize a global jihadist attack has been mounted, the United States and the UK--its primary targets--lead the counter-offensive. Sally Hanning, a brilliant British MI5 agent whose parents were massacred in a terrorist ambush, is seconded to the CIA task force to hunt the Iranian mastermind through Al Qaeda's intricately coded use of social media and the Internet. Jack Irvine is NSA's guilt-burdened code-cracker--it...
Author
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
13) Price of duty
Author
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
Description
This resource provides a complete overview of cyber warfare, which has been used with increasing frequency in recent years by such countries as China, Iran, Israel, North Korea, Russia, and the United States. Readers will gain an understanding of the origins and development of cyber warfare and of how it has become a major strategic element in warfare for countries throughout the world.
Author
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Description
"Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate of nations. The result is that war, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P. W. Singer...
17) Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Formats
Description
"Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...
18) The Fox
Author
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Description
"As cyber-attacks dominate front-page news, as hackers displace terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prize-winning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information...
Author
Description
Finding himself alone in a posh New York City hotel room for the night, Aidan does what any red-blooded seventeen-year-old would do-- he tries to hook up with someone new. But that lapse in judgment leads to him waking up next to a dead guy, which sparks an epic case of mistaken identity. Now he's on the run from federal agents -- and a cyber-terrorist group who will stop at nothing to find him.
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request