Catalog Search Results
2) Hawk
Author
Series
Quiet professionals volume 2
Formats
Description
Raptor's communications expert, Staff Sergeant Brian "Hawk" Bledsoe, is struggling with his inner demons, leaving him on the verge of an "other than honorable" discharge. Plagued with corrupted intel, Raptor team continues to track down the terrorist playing chess with their lives. Afghan pilot Fekiria Haidary is devastated when a systems glitch on her aircraft forces a weapons launch on a safe target. And when the deadly bombing separates Hawk from...
3) Raptor 6
Author
Series
Quiet professionals volume 1
Formats
Description
Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because...
Author
Pub. Date
[2022]
Description
"Longlisted for the Airey Neave Book Prize, Airey Neave Trust" Amy Zegart is senior fellow at the Hoover Institution and the Freeman Spogli Institute for International Studies at Stanford University and a contributing writer at The Atlantic. Her books include Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton) and (with Condoleezza Rice) Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity. She lives in...
Author
Pub. Date
[2020]
Description
"April Falcon Doss, a cybersecurity and privacy expert with experience working for the NSA and the US government, explores the most common types of data being collected about individuals today and delve into how it is being used-sometimes against us-by the private sector, the government, and even our employers and schools"--
10) Falcon
Author
Series
Quiet professionals volume 3
Pub. Date
2015
Description
Special Forces operator Salvatore "Falcon" Russo vowed to never again speak to or trust Lieutenant Cassandra Walker after a tragedy four years ago. But as Raptor closes in on the cyber terrorists responsible for killing two of their own, Sal must put his life-- and the lives of his teammates-- in her hands. Cassie is ill-prepared for Falcon's resistance and the fallout. As allies become enemies and hostiles become unlikely partners, Raptor fights...
Author
Series
Pub. Date
2015.
Description
"Recent revelations of extensive government surveillance programs pit privacy concerns against the need to fight terrorism and crime. Using cases involving real people, this book explores how federal agencies, local law enforcement, and even schools are collecting, using and perhaps abusing the personal information they gather online. The book concludes with a discussion of proposed regulations and policies that could strike a better balance between...
Author
Pub. Date
2019.
Description
A Bookish Must Read for 2019 An Amazon Best Book of the Month Featured on NBC's TODAY and Nightly News "Smith's writing style…is crisp as he charts the course of Alien's life in a series of vignettes from uncertain undergraduate to successful business owner. The structure works because Smith is a lively storyteller." -The New York Times Book Review "Amusing and cautionary tale."-WORLD Magazine "A fascinating look at hacking and...
Series
Reference shelf volume 89, no. 2
Pub. Date
2017.
Description
This volume examines personal cybersecurity and considers net neutrality and government surveillance, new challenges to privacy, and the power and influence of technology.
Author
Pub. Date
2012
Description
"From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. Using real life stories and his own consulting experience, J.J. Luna shows you legal methods for protecting yourself from information predators and how to secure your bank accounts, business dealings, computer files, and even your home address. In this third updated edition, there are...
15) The fifth domain: defending our country, our companies, and ourselves in the age of cyber threats
Author
Pub. Date
2019.
Description
Presents an urgent assessment of how governments, businesses, and everyday citizens can counter and prevent attacks by criminal hackers determined to create a digital war zone.
Author
Pub. Date
[2019]
Description
"We all know that the Internet can serve as a hotbed for identity theft. But it isn't the only place where your privacy can be breached. In fact, there are lots of ways you can protect your privacy (or diminish it) that have little or nothing to do with access to the internet. Your home, your photos, your trash can, your kids, your favorite restaurant or store--and even you have the ability to unknowingly reveal your private information to everyone...
Author
Pub. Date
2004
Description
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly revised update of his immensely popular guide, J.J. Luna shows you how to protect yourself from these information predators by securing your vehicle and real estate ownership, your bank accounts, your business dealings, your computer files, your home address, and more....
Author
Series
Pub. Date
[2014]
Description
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from...
20) Dawn of the code war: America's battle against Russia, China, and the rising global cyber threat
Author
Pub. Date
[2018].
Description
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...