Catalog Search Results
Author
Pub. Date
2021.
Description
"From two former military officers and award-winning authors, a chillingly authentic, geopolitical thriller that imagines a naval clash between the US and China in the South China Sea in 2034 -- and the path from there to a nightmarish global conflagration. On March 12, 2034, US Navy Commodore Sarah Hunt is on the bridge of her flagship, the guided missile destroyer USS John Paul Jones conducting a routine freedom of navigation patrol in the South...
Author
Pub. Date
[2020]
Description
"Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In [this book], Maureen Webb offers another views. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralized democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism...
3) Snow crash
Author
Series
Description
"Hiro lives in a Los Angeles where franchises line the freeway as far as the eye can see. The only relief from the sea of logos is within the autonomous city-states, where law-abiding citizens don't dare leave their mansions. Hiro delivers pizza to the mansions for a living, defending his pies from marauders when necessary with a matched set of samurai swords. His home is a shared 20 X 30 U-Stor-It. He spends most of his time goggled in to the Metaverse,...
Author
Pub. Date
2020.
Description
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the...
5) Neuromancer
Author
Series
Appears on these lists
Formats
Description
The Matrix unfolds like neon origami beneath clusters and constellations of data. Constructs, AIs, live here. Somewhere, concealed by ice, Neuromancer is evolving. As entropy goes into reverse, Molly's surgical implants broadcast trouble from the ferro-concrete geodesic of the Sprawl. Maelcum, Rastafarian in space, is her best hope of rescue. But she and Case, computer cowboy, are busy stealing data from the almighty Megacorps. If the Megacorps do...
Author
Series
Formats
Description
The head of the U.S. National Underwater and Marine Agency’s (NUMA) Special Assignments Team unravels a new mystery in the dangers above and below the sea in the latest addition to the long-running series following Fast Ice.
A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe...
Author
Series
Wyman Ford novels volume 4
Formats
Description
NASA is building a probe to be splashed down in the Kraken Mare, the largest sea on Saturns great moon, Titan. It is one of the most promising habitats for extraterrestrial life in the solar system, but the surface is unpredictable and dangerous, requiring the probe to contain artificial intelligence software. To this end, Melissa Shepherd, a brilliant programmer, has developed "Dorothy," a powerful, self-modifying AI whose true potential is both...
Author
Series
Pub. Date
2016
Description
The North Korean government is days away from realizing its nuclear ambitions and only the heroes of SEAL Team Six can stop it.
Chief Warrant Officer Thomas Crocker of SEAL Team Six's Black Cell is in Las Vegas after conducting a training exercise in the desert with new members of the team. Lounging by the pool at Caesar's Palace, he witnesses an argument between hotel security guards and three Asian men in corporate attire that quickly turns physical....
Author
Pub. Date
2017.
Description
Cyber technology and counterterrorism are a hot topic today, and this book details how criminals, terrorists, and enemy governments attempt to use technology against the United States. How can we counter this threat? What training is our military and government using to prevent and/or repel cyberattacks? Students will learn about the cyber warriors who protect our nation's information networks. Historical accounts include narrative about the codebreakers...
Author
Pub. Date
2018.
Description
"Clint Watts electrified the nation when he testified in front of the Senate Select Committee on Intelligence regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don't hack your computer, they hack your mind. Watts reveals how these malefactors use your social media information and...
11) Diaspora
Author
Pub. Date
2015
Description
Since the Introdus in the twenty-first century, humanity has reconfigured itself drastically. Most chose immortality, joining the polises to become conscious software. Others opted for gleisners: disposable, renewable robotic bodies that remain in contact with the physical world of force and friction. Many of these have left the solar system forever in fusion-drive starships. And there are the holdouts: the fleshers left behind in the muck and jungle...
Author
Pub. Date
1996
Description
If ever a subject was made for an author, Dave Barry and cyberspace are perfectly matched. Just imagine what can happen when Dave and his computer go mano a mano. In Dave Barry in Cyberspace, you'll learn how to produce attractive, high-impact documents when you have absolutely nothing to say; visit the world's largest computer trade show - Nerdstock in the desert; use Internet shorthand; chat with total strangers who may be boring and stupid; and...
13) Cyberwarfare
Series
Pub. Date
[2018]
Description
There is warfare, and there is cyberwarfare. In today's technologically-driven world, governments, and even terrorist groups and hacktivists, engage in cyberwarfare to attack or disrupt the operations of other nations and organizations. Recent revelations about cyberattacks that threatened individual and national security have caused ripples of concern and outrage, but tend to die down quickly. How safe are we, and do we take security for granted?...
Author
Series
Net Force Explorers volume 15
Pub. Date
2001
Description
Playing detective in a mystery simulation, Net Force Explorer Matt Hunter investigates the high-profile murder of a wealthy young socialite--last seen alive with the heir apparent to a political dynasty. But this mystery is based on reality, and someone will go to any length to keep the more than 40-year-old case closed.
Author
Series
Net Force Exporers volume 4
Pub. Date
1999
Description
The Net Force is determined to rescue Julio and his family, who are being held hostage.
Author
Series
Net Force Explorers volume 14
Pub. Date
2001
Description
Explorer Andy Moore is enlisted to program virtual animals for the Cservanka Brothers Circus. But underneath the big top, a dark side emerges. And the only thing Andy finds in the cyber-circus is a black market ring -- in high tech weapons software and hardware.
18) Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Pub. Date
[2018].
Description
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...
Author
Pub. Date
2008.
Description
Essayist Siegel is known for passionately arguing contrarian points of view, which is why he's the perfect person to write a critical book about the Web that has almost nothing to do with technology and everything to do with what it's doing to the people who use it. Siegel forces readers to radically rethink a familiar medium, arguing that the Web and complementary developments--from reality television to the emergence of business prophets like Malcolm...