Catalog Search Results
Author
Series
Formats
Description
The head of the U.S. National Underwater and Marine Agency’s (NUMA) Special Assignments Team unravels a new mystery in the dangers above and below the sea in the latest addition to the long-running series following Fast Ice.
A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe...
Author
Pub. Date
2021.
Formats
Description
"From two former military officers and award-winning authors, a chillingly authentic, geopolitical thriller that imagines a naval clash between the US and China in the South China Sea in 2034 -- and the path from there to a nightmarish global conflagration. On March 12, 2034, US Navy Commodore Sarah Hunt is on the bridge of her flagship, the guided missile destroyer USS John Paul Jones conducting a routine freedom of navigation patrol in the South...
Author
Series
Pub. Date
2016
Description
The North Korean government is days away from realizing its nuclear ambitions and only the heroes of SEAL Team Six can stop it.
Chief Warrant Officer Thomas Crocker of SEAL Team Six's Black Cell is in Las Vegas after conducting a training exercise in the desert with new members of the team. Lounging by the pool at Caesar's Palace, he witnesses an argument between hotel security guards and three Asian men in corporate attire that quickly turns physical....
Author
Pub. Date
2017.
Accelerated Reader
IL: MG - BL: 8.2 - AR Pts: 1
Description
Cyber technology and counterterrorism are a hot topic today, and this book details how criminals, terrorists, and enemy governments attempt to use technology against the United States. How can we counter this threat? What training is our military and government using to prevent and/or repel cyberattacks? Students will learn about the cyber warriors who protect our nation's information networks. Historical accounts include narrative about the codebreakers...
5) Cyberwarfare
Series
Pub. Date
[2018]
Description
There is warfare, and there is cyberwarfare. In today's technologically-driven world, governments, and even terrorist groups and hacktivists, engage in cyberwarfare to attack or disrupt the operations of other nations and organizations. Recent revelations about cyberattacks that threatened individual and national security have caused ripples of concern and outrage, but tend to die down quickly. How safe are we, and do we take security for granted?...
Author
Series
Pub. Date
[2023]
Description
"The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about...
Author
Pub. Date
2020.
Description
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the...
Author
Pub. Date
[2018].
Description
Over the past decade, there have been a series of internet-linked attacks on American interests, including North Korea's retaliatory hack of Sony Pictures, China's large-scale industrial espionage, Russia's 2016 propaganda campaign, and quite a lot more. The cyber war is upon us. Former Assistant Attorney General John Carlin has been on the frontlines of America's ongoing cyber war with its enemies. In this dramatic book, he tells the story of his...