Catalog Search Results
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 15
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
Author
Series
Pub. Date
[2019]
Description
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity...
Author
Pub. Date
2019.
Formats
Description
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself.
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was...
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was...
Author
Pub. Date
2016.
Description
The National Cyber Intelligence Center (NCIC) of Colorado Springs is being developed in cooperation with the Governor's office along with a number of other partners. This collaboration is centered around three broad programmatic areas;1) a program to provide education to public leaders(Cyber Institute-CI), 2) a program to support research, education and training in cyber security(Cyber Research, Education and Training Center -CRETC) and 3) a program...
Author
Series
Pub. Date
2012.
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is...
Author
Series
Aimee Leduc investigations volume 3
Formats
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
15) Raptor 6
Author
Series
Quiet professionals volume 1
Formats
Description
Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because...
Author
Series
Issue brief volume 20-08
Pub. Date
2020.
Description
This issue brief provides an overview of consumer data privacy, describes applicable federal laws, and summarizes recent state legislation proposed to strengthen consumer data privacy laws.