Catalog Search Results
Author
Formats
Description
The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
2) The sentinel
Author
Formats
Description
It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Description
Del mismo autor de los Bestsellers "El Código Da Vinci" y "Ángeles y demonios," FonoLibro les trae una apasionante novela llena de claves secretas, mensajes ocultos, engaños y crímenes.
"Fortaleza Digital" los mantendrá en suspenso y no podrá dejar de escucharlo hasta que llegue al final. La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa...
4) Sneakers
Description
Robert Redford leads an all-star cast in one of the most satisfying suspense films! His team is routinely hired to test security systems. Bishop's (Redford) past comes back to haunt him when government agents blackmail the "sneakers" into carrying out a covert operation; tracking down the elusive black box. Bishop's team retrieves the box and makes a stunning discovery--the device can break into any computer system in the world. Also starts Sidney...
Author
Description
"Two accomplished cyber security experts guide readers through the dangers, traps, and pitfalls of online life. Learn how cyber criminals operate and how you can defend yourself and your family from online security threats. From Facebook, to Twitter, to online banking we are all increasingly exposed online with thousands of criminals ready to bounce on the slightest weakness. This indispensable guide will teach you how to protect your identity and...
6) Firewall
Description
Thieves kidnap an IT security experts family and demand he help them breech a bank's security and steal one hundred million dollars.
Author
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Description
Spying has never been more ubiquitous - or less understood. The world is drowning in spy movies, TV shows, and novels, but universities offer more courses on rock and roll than on the CIA, and there are more congressional experts on powdered milk than espionage. This crisis in intelligence education is distorting public opinion, fueling conspiracy theories, and hurting intelligence policy. In Spies, Lies, and Algorithms, Amy Zegart separates fact...
10) Hush-hush
Author
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request