Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
36
result(s) for
"Cyberterrorism Fiction."
Sort by:
Acts of vanishing
\"One winter evening just before Christmas, Stockholm is plunged into a sudden, citywide blackout. Radio, internet, phone service--all cut out simultaneously, cloaking the city in darkness and silence. On the pitch-black streets, a young woman carries a message for her estranged father. It may be the key to reversing the blackout and preventing further attacks. But someone powerful is determined to stop her from delivering it... Code breaker and cyber-security expert William Sandberg recieved an anonymous email, immediately before the blackout, with very specific directions to be followed. Sandberg is taken into custody-just when he most needs to be in action to clear his name, find his daughter, and save the country from disaster\"--Amazon.com.
Stealing the Network
by
Long, Johnny
,
Mullen, Timothy
,
Russell, Ryan
in
Computer hackers
,
Computer security
,
Cyberterrorism
2007
The final book in the best selling series.
Price of duty
When Russia constructs its most dangerous weapon since the atomic bomb and launches carefully plotted attacks on unsuspecting U.S. and European targets, Brad McLanahan and his Scion team arm themselves with the world's most advanced technological weaponry to prevent a full-scale cyber war.
Stealing the Network: How to Own an Identity
2005
The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Hacking a terror network : the silent threat of covert channels
2005
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic \"insider's look\" into technically sophisticated covert terrorist communications over the Internet. The accompanying CD-ROM allows readers to \"hack along\" with the story line, by viewing the same Web sites described in the book containing encrypted, covert communications.Hacking a Terror NETWORK addresses the technical possibilities of Covert Channels in combination with a very real concern: Terrorism. The fictional story follows the planning of a terrorist plot against the United States where the terrorists use various means of Covert Channels to communicate and hide their trail. Loyal US agents must locate and decode these terrorist plots before innocent American citizens are harmed. The technology covered in the book is both real and thought provoking. Readers can realize the threat posed by these technologies by using the information included in the CD-ROM. The fictional websites, transfer logs, and other technical information are given exactly as they would be found in the real world, leaving the reader to test their own ability to decode the terrorist plot. Cyber-Thriller focusing on increasing threat of terrorism throughout the world. Provides a fascinating look at covert forms of communications used by terrorists over the Internet. Accompanying CD-ROM allows users to \"hack along\" with the fictional narrative within the book to decrypyt.
Dark winter
\"By the time anyone realizes what's happening, it is too late. A dark network of hackers has infiltrated the computers of the U.S. military, unleashing chaos across the globe. U.S. missiles strike the wrong targets. Defense systems fail. Power grids shut down. Within hours, America's enemies move in. Russian tanks plow through northern Europe. Iranian troops invade Iraq. North Korean destroys Seoul and fires missiles at Japan. Phase 1 of ComWar is complete. Enter Jake Mahegan and his team of highly trained operatives. Their mission is to locate the nerve center of ComWar--aka Computer Optimized Warfare--and to shut down the operation through any means necessary.\" -- (Source of summary not specified)
Stealing the Network
by
Thor
,
Grand, Joe
,
Russell, Ryan
in
Computer hackers
,
Computer security
,
Computer security - Fiction
2004
A fictional continent is emerging as a major new economic, political and military force on the world stage. However, their rapid growth has left little in the way of time and money to sure up their Internet backbone, and it is vulnerable to a potentially catastrophic attack. Who are the bad guys? What do they want?.
Cyber terrorism: a clear and present danger, the sum of all fears, breaking point or patriot games?
2006
Over the past two decades there has developed a voluminous literature on the problem of cyber terrorism. The themes developed by those writing on cyber terrorism appear to spring from the titles of Tom Clancy's fiction, such as Clear and Present Danger, The Sum of All Fears and Breaking Point, or somewhat more cynically, Patriot Games. This essay examines both the gap between the presumed threat and the known cyber terror behaviors and the continuing literature which suggests an attack is imminent. It suggests that at least part of the explanation lies both in the continuing failure to distinguish between what Denning (Activism, hacktivism, and cyber terrorism: The Internet as a tool for influencing foreign policy, 1999) referred to as hacktivism and cyberterrorism and also the failure to distinguish between the use of digital means for organizational purposes (information, communication, command and control) and the use of digital communications to actually commit acts of terror. Adapted from the source document.
Journal Article
Warfare, from Cold to Cyber
2015
Today’s duel specters of sophisticated psychoterror and cyber warfare imperil our right to privacy and freedom. Experts warn that the cyberscape threatens to become the new war front among rival powers. Will our technology outflank our technical capacity—and our moral will—to safeguard civil liberties?
Journal Article