Catalog Search Results
Author
Series
Language
English
Description
NASA's Goddard Space Flight Center is designing a probe which will be dropped into the Kraken Mare, one of the methane seas of Titan. There, it will embark on a journey of exploration. As the probe is being tested at Goddard, things go awry, and an explosion kills seven scientists. The AI program in the probe, a powerful, self-modifying AI called "Dorothy," flees into the Internet. Wyman Ford is tapped by the president's science advisor to track down...
Author
Publisher
Wiley
Language
English
Description
"A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book...
Author
Publisher
Yale University Press
Pub. Date
[2022]
Language
English
Description
"Faced with relentless technological aggression that imperils democracy, how can Western nations fight back? Before the cyber age, foreign interference in democratic politics played out in a comparatively narrow arena. The rapid expansion of cyberspace has radically altered this situation. The hacking activities of Russian military agents in the 2016 US presidential election and other major incidents demonstrate the sophisticated offensive strategies...
8) Trackers
Author
Series
Trackers volume 1
Pub. Date
2010
Accelerated Reader
IL: MG - BL: 5.5 - AR Pts: 7
Lexile measure
810L
Language
English
Description
When the mysterious Glyphmaster tricks Adam into solving a puzzle and then hacks his computers, Adam, Finn, Lewis, and Emily are pulled into a mystery that is more trouble than they ever imagined.
Author
Language
English
Formats
Description
"Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy. Topics include addressing vulnerabilities, building a secure enterprise, blocking intrusions, ethical and legal issues, and business continuity. Updates include topics such...
10) Hacker states
Author
Series
Publisher
MIT Press
Pub. Date
[2020]
Language
English
Description
In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous);...
Author
Publisher
Harvard University Press
Pub. Date
2020.
Language
English
Appears on list
Description
"The threat of cyberwar can feel like something out of a movie: nuclear codes hacked, powerplants melting down, immediate crisis. In reality, state-sponsored hacking looks nothing like this. It's covert, insidious, and constant. Ben Buchanan reveals the cyberwar that's already here, reshaping the global contest for geopolitical advantage"--
Author
Series
Publisher
RAND
Pub. Date
2009.
Language
English
Formats
Description
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.