cyberterrorism

Type: 
Topical Term
Subfield: 
a
Alias: 
cyberterrorism

The game of lives

2015
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day. The Mortality Doctrine--Kaine's master plan--has nearly been realized, and little by little the line separating the virtual from the real is blurring. If Kaine succeeds, it will mean worldwide cyber domination. And it looks like Michael and his friends are the only ones who can put the monster back in the box--if Michael can figure out who his friends really are"--Provided by publisher.

Mortality doctrine

The eye of minds
2013
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"-- Provided by publisher.

The eye of minds

2014
Michael, a skilled internet gamer in a world of advanced technology, is called upon to seek out a cyber-terrorist when he begins to threaten players.

MindWar

2014
"Rick Dial has the potential to be a hero. He just doesn't know it yet. Rick's high school football team couldn't be stopped when he was leading them as their quarterback. He was going to Syracuse on a scholarship. But then his dad abandoned them and a terrible accident left him crippled.Certain his old life is completely lost, Rick spends months hiding away in his room playing video games. He achieves the highest scores on so many games that he'sapproached by a government agency who claims to be trying to thwart a cyber attack on America that would destroy the technological infrastructure of the entire country. The agents say that the quick-thinking of a quarterback coupled with Nick's gaming experience make him perfect for this assignment. The problem is that there are no extra lives and this isn't just a game. but Rick doesn't have many other options at the moment. Entering The Realm gives Rick the one thing he thought he'd never have again: a body that's as fast and as strong as he ever was before the accident. But the more time he spends in The Realm, the more questions he has. What secrets are these agents keeping from him? What really happened to his father? How many others have gone into The Realm already. and failed? And perhaps most important, is he the hero they think he is?"--.

Cyber crime secrets

Examines the job of online forensic scientists as they track down traces of coding left by cybercriminals. Explores the nature of online thieving and vandalism as well as how electronic devices like cell phones can be used as evidence.

The game of lives

Morality Doctrine, Book 3
2015
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day. The Mortality Doctrine--Kaine's master plan--has nearly been realized, and little by little the line separating the virtual from the real is blurring. If Kaine succeeds, it will mean worldwide cyber domination. And it looks like Michael and his friends are the only ones who can put the monster back in the box--if Michael can figure out who his friends really are"--Provided by publisher.

Cyber warfare

a reference handbook
Provides a comprehensive overview of issues related to cyber warfare. Presents a historical overview of the topic; discusses related problems, controversies, and solutions; offers differing perspectives; and includes profiles of involved individuals. Also features data and primary source documents, resources for further study, a chronology, and a glossary of terms.

@WAR

the rise of the military-Internet complex
The United States military now views cyberspace as the "fifth domain" of warfare, alongside land, air, sea, and space. All of our protection agencies field teams of hackers who launch cyber strikes against enemy targets. These virtual warriors, along with a growing band of private-sector counterparts, are charged with defending us against the vast array of criminals, terrorists, and foreign governments who attack us with ever-increasing frequency and effectiveness.

Cybersecurity and cyberwar

what everyone needs to know
2014
Provides information on cybersecurity, discussing the central issues, how cybersecurity works, and why it is important.

Cyberterrorism

2010
This book describes cyberattacks which have occurred and the various techniques used, and examines the likelihood of cyberterrorism threatening national and international security.

Pages

Subscribe to RSS - cyberterrorism