Catalog Search Results
2) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Pub. Date
2016.
Description
The National Cyber Intelligence Center (NCIC) of Colorado Springs is being developed in cooperation with the Governor's office along with a number of other partners. This collaboration is centered around three broad programmatic areas;1) a program to provide education to public leaders(Cyber Institute-CI), 2) a program to support research, education and training in cyber security(Cyber Research, Education and Training Center -CRETC) and 3) a program...
Author
Series
Pub. Date
2012.
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is...
Author
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 15
Formats
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
Author
Series
Issue brief volume 20-08
Pub. Date
2020.
Description
This issue brief provides an overview of consumer data privacy, describes applicable federal laws, and summarizes recent state legislation proposed to strengthen consumer data privacy laws.
Author
Pub. Date
2020.
Description
As the situation regarding coronavirus (COVID-19) rapidly changes, unique cyber risks are emerging for government, businesses, and individuals. This memorandum provides an overview of cybersecurity, the current threat landscape as a result of COVID-19, and provides information about COVID-19 cybersecurity resources.
Author
Pub. Date
2018.
Description
Three initiatives integrate cyber security resources to protect Colorado elections: 1) Securing the statewide voter registration system; 2) Securing overseas and military ballot return with encryption; 3) Colorado threat information sharing and joint fusion center. These initiatives make Colorado one of the safest states to cast a ballot resulting in one of the highest voter turnout.
17) Attack surface
Author
Series
Pub. Date
2020.
Formats
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counter-terrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
19) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
20) Zero days
Author
Pub. Date
c2019.
Description
A deadly virus is threatening the world's computers. It's smart, fast, and developed by a group of elite hackers. It can break through the highest security, crippling any system within seconds. It's the ultimate cyber weapon. Nobody understands the mind of a hacker quite like Chuck Drayton. But he's gone offline, rocked with guilt after a failed operation cost innocent lives. When Chuck is called back into action, he soon gets caught in the perilous...