cyberterrorism

Type: 
Topical Term
Subfield: 
a
Alias: 
cyberterrorism

The minders

2021
"The new high concept thriller from the author of The Passengers and the word-of-mouth sensation The One, soon to be a Netflix original series. In the 21st century, information is king. But computers can be hacked and files can be broken into - so a unique government initiative has been born. Five ordinary people have been selected to become "minders" - the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure, the country's most classified information has been taken offline and turned into genetic code implanted inside their heads. Together, the five know every secret - the truth behind every government lie, conspiracy theory and cover up. In return, they're given the chance to leave their problems behind and a blank slate to start their lives anew. But not everyone should be trusted, especially when they each have secrets of their own they'll do anything to protect..."--.

La batalla final

Michael has to figure out who his friends are in order to put Kaine back in the box, otherwise Kaine will achieve worldwide cyber domination.

Cyberterrorism

2019
"The last two decades have seen the ever-accelerating development of new technologies, from the Internet and software applications to artificial intelligence, drones, and robotics. Alongside these advances, a new global threat has emerged: cyberterrorism. Through full-color photographs, sidebars, and a glossary, students will learn about different types of cyberattacks and cyberterrorists and the real and potential impacts they can have, as well as how nations and individuals are fighting back against this looming threat"--Provided by the publisher.

Cyber wars

2018
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace.

This is how they tell me the world ends

the cyber- weapons arms race
2020
"Zero day: a software bug that allows a hacker to break into your devices and move around undetected. For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar to hackers willing to sell their lock-picking code and their silence. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. [The author] lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--OCLC.

The Hacker's Key

Ada Genet spent her childhood helping her father, master thief Remy Genet. But when they were finally caught, Remy ended up in prison and Ada was sent to a military boarding school. When the Hacker's Key, a tool that can shut down every computer, smartphone, and internet-connected device, is stolen from a secret UN installation, a clue left at the scene points to Remy, but he's been in prison the whole time. Remy will only speak to Ada and he sends her off on a global quest to find the Hacker's Key before it can be used.

Ghost in the shell

the official movie novelization
In the world of the future metropolises are dominated by technology, and that means the most dangerous criminals and extremists have become just as powerful as the government. Section 9 are tasked with stopping them, and their Major is a special ops, totally unique human-cyborg hybrid. A hacker emerges with the manic goal of destroying cyber technology like that in Major.

Critical perspectives on cyberwarfare

Provides opinions on cyberwarfare and its consequences.
Cover image of Critical perspectives on cyberwarfare

Swipe right for murder

Seventeen-year-old Aidan finds himself alone in a fancy NYC hotel and, being young and red-blooded, he tries to hook up with someone new only to end up in a room with a corpse and a mysterious flash drive. Aidan is mistaken for the perpetrator and must go on the run from everyone--the authorities, his family, his friends, and the people now out to kill him.
Cover image of Swipe right for murder

Threats to civil liberties

privacy
This book helps teen readers understand the issues of privacy, how it has come about, what actions are being taken to address the concerns, and why some of those actions are controversial.
Cover image of Threats to civil liberties

Pages

Subscribe to RSS - cyberterrorism