cyberterrorism

Type: 
Topical Term
Subfield: 
a
Alias: 
cyberterrorism

Mafiaboy

a portrait of the hacker as a young man
2011
In 2000, an unknown attacker brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. The FBI, police, and independent security experts launched a manhunt as President Clinton convened a cyber security summit to discuss how best to protect America's information infrastructure from future attacks. Then, after hundreds of hours of wiretapping, law enforcement officials executed a late-night raid and came face-to-face with the most wanted man in cyberspace: a fifteen-year-old whose username was "Mafiaboy." Despite requests from every major media outlet, that young man, Michael Calce, has never spoken publicly about his crimes-until now. Equal parts true-crime thriller and expos?, Mafiaboy will take you on an electrifying tour of the fast-evolving twenty-first-century world of hacking-from disruptions caused by teens like Calce to organized crime and other efforts with potentially catastrophic results. It also includes a guide to protecting yourself online.

The dark side of the Internet

protecting yourself and your family from online criminals
2006

Tom Clancy's power plays

Cutting edge
2002
Africa has become the battleground of a 21st-century war. As fiber-optic cable is laid down around the continent, UpLink Communications, headed by Roger Gordian, battles for control against his nemesis, Harlan DeVane, who trades in black-market commodities with terrorists and rogue states. DeVane kidnaps Gordian's daughter to ensure his success. Now Gordian must trust his UpLink team as never before.

Cyber war

the next threat to national security and what to do about it
2010
Analyzes the threat to U.S. national security of cyber war. Explains what cyber war is, how its weapons work, and how the nation is vulnerable to cyber attack. Discusses examples of how foreign cyber spies have hacked into the office of the Secretary of Defense, the control systems for U.S. electric power grids, and the plans to protect America's new fighter aircraft.

The next war zone

confronting the global threat of cyberterrorism
2002
Explains the hidden dangers of cyberterrorism, discussing how terrorists have the power to shut down the world's airports, power plants, factories, fuel supplies, armed forces, and the Internet, and explains what measures can be taken to reduce the threat of cyberterrorism.

Cybercrime

a reference handbook
2004

Careers as a cyberterrorism expert

2011
An introduction to jobs focused on preventing incidents of cyberterrorism, including options within the government, military, and the law, and describing the skills, knowledge, outlook, and habits required to achieve success as a professional.

Zero day

a novel
2011
"Over the Atlantic, an airliner's controls suddenly stop reacting. In Japan, an oil tanker runs aground when its navigational system fails. An in the Midwest, a nuclear power plant nearly becomes the next Chernobyl. At first, these computer failures seem unrelated. But Jeff Aiken, a former government analyst who saw the mistakes made before 9/11, fears that there may be a more serious attack coming. And he soon realizes that there isn't much time if he hopes to stop an international disaster. Zero Day presents a chilling "what if" scenario written in the vein of Richard A. Clarke and Daniel Suarez"--.

Stephen Coonts' Deep black--conspiracy

2008
"A Secret Service agent is dead, an apparent suicide. A presidential candidate narrowly escapes an assassin's bullet. And Desk Three, a convert branch of the NSA, is searching for a chilling connection deep inside the Republic of Vietnam"--Publisher.

The eye of minds

2013
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secrets out"--Provided by publisher.

Pages

Subscribe to RSS - cyberterrorism