Catalog Search Results
Author
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 15
Language
English
Formats
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
2) Zero days
Author
Publisher
RedDoor Publishing
Pub. Date
c2019.
Language
English
Description
A deadly virus is threatening the world's computers. It's smart, fast, and developed by a group of elite hackers. It can break through the highest security, crippling any system within seconds. It's the ultimate cyber weapon. Nobody understands the mind of a hacker quite like Chuck Drayton. But he's gone offline, rocked with guilt after a failed operation cost innocent lives. When Chuck is called back into action, he soon gets caught in the perilous...
3) Sneakers
Publisher
Universal
Pub. Date
2003.
Language
English
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
Author
Publisher
University of Colorado Colorado Springs
Pub. Date
2016.
Language
English
Description
The National Cyber Intelligence Center (NCIC) of Colorado Springs is being developed in cooperation with the Governor's office along with a number of other partners. This collaboration is centered around three broad programmatic areas;1) a program to provide education to public leaders(Cyber Institute-CI), 2) a program to support research, education and training in cyber security(Cyber Research, Education and Training Center -CRETC) and 3) a program...
Author
Series
Publisher
Silicon Flatirons Center
Pub. Date
2012.
Language
English
Description
The financial and competitive implications of cyberattacks cause many to consider them the most important threat to the future of the United States. The Federal Bureau of Investigation called the threat the "No. 1 concern as foreign hackers . . . penetrate American firms' computers and steal huge amounts of valuable data and intellectual property." Although difficult to quantify or identify and easy to downplay, it is fair to say that the threat is...
Author
Publisher
Harper Perennial
Pub. Date
[2018]
Language
English
Description
Awakening from a dream with more than one hundred predictions about the future in his head, an unassuming Manhattan bassist becomes one of the world's most powerful men and hides his identity behind an online persona that is targeted by greedy corporations and dangerous enemies.
Author
Series
Aimee Leduc investigations volume 3
Publisher
Soho Press
Pub. Date
[2002]
Language
English
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
Publisher
Colorado Statewide Internet Portal Authority
Pub. Date
2013.
Language
English
Description
The aim of this paper is to provide a glimpse into perspectives shared from the government sector, based on a limited group of respondents to a survey, coupled with how the market perceives Risk, and then to offer practical guidance for managing risk in the 21st Century.
Publisher
[s.n.]
Pub. Date
[2014]
Language
English
Description
Computers hold our treasured photographs, private emails, and all of our personal information. This data is precious, and cybercriminals want it. From the sleuths who decoded the world₂s most advanced cyber weapon to scientists who believe they can store a password in your unconscious brain, NOVA investigates how a new global geek squad is harnessing cutting-edge science, all to stay one step ahead of the hackers.
13) Zero days
Publisher
Magnolia Home Entertainment
Pub. Date
[2017]
Language
English
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
14) Raptor 6
Author
Series
Quiet professionals volume 1
Publisher
Shiloh Run Press
Pub. Date
[2014]
Language
English
Description
Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because...
Author
Series
Issue brief volume 20-08
Publisher
Colorado Legislative Council
Pub. Date
2020.
Language
English
Description
This issue brief provides an overview of consumer data privacy, describes applicable federal laws, and summarizes recent state legislation proposed to strengthen consumer data privacy laws.
Author
Series
Issue brief volume 14-23
Publisher
Colorado Legislative Council
Pub. Date
2014.
Language
English
Author
Publisher
Hanover Square Press
Pub. Date
[2023]
Language
English
Description
To prevent global chaos, Net Force agent Kali Alcazar, a member of America's elite cyber-defense organization, leads a final strike against the world's most dangerous hacker, discovering too late that he has prepared a deadly trap for them all.
Publisher
Colorado Department of Higher Education
Pub. Date
2019-
Language
English
Description
The Department of Higher Education (DHE, the Department) to prepare a report detailing progress made towards critical state cybersecurity goals at institutions of higher education that received an appropriation through SB 18-086.