Catalog Search Results
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Media outlets report to us regularly on the latest external cyber-attacks and security breaches. From credit card companies to financial institutions to retailers, there have been many enterprises that have fallen victim to cyber criminals and hacktivists. But recently the headlines have also been buzzing about insider-attacks. Initiated by disgruntled employees or malicious business partners, they can be very costly and difficult for the organization...
Author
Series
Mortality doctrine volume 3
Pub. Date
2015.
Accelerated Reader
IL: UG - BL: 5.4 - AR Pts: 12
Language
English
Formats
Description
"Michael and his friends, Sarah and Bryson, must stop the Mortality Doctrine and those behind it now as the fate of humanity is in the balance"--
Author
Series
Mortality doctrine volume 1
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 11
Language
English
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--Provided by publisher.
4) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Series
Mortality doctrine volume 2
Pub. Date
2014.
Accelerated Reader
IL: UG - BL: 5.2 - AR Pts: 12
Language
English
Formats
Description
"Michael and his friends, Sarah and Bryson, are still being chased by a cyber-terrorist. And now the government is after them, too"--Provided by publisher.
Author
Pub. Date
2015.
Language
English
Description
Imagine a blackout lasting not days, but weeks or months. Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before. It isn't just a scenario. A well-designed attack...
Author
Series
Patrick McLanahan novels volume 21
Language
English
Formats
Description
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
12) The fox
Author
Language
English
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Publisher
JIMMY Patterson Books/Little, Brown and Company
Pub. Date
2019.
Language
English
Description
Finding himself alone in a posh New York City hotel room for the night, Aidan does what any red-blooded seventeen-year-old would do-- he tries to hook up with someone new. But that lapse in judgment leads to him waking up next to a dead guy, which sparks an epic case of mistaken identity. Now he's on the run from federal agents -- and a cyber-terrorist group who will stop at nothing to find him.
Author
Series
Language
English
Formats
Description
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers,...
Author
Series
Pike Logan thrillers volume 17
Pub. Date
[2023]
Language
English
Formats
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
In MnLINK
Didn't find what you need? Items not owned by Plum Creek Library System can be requested from other MnLINK libraries to be delivered to your local library for pickup.