Catalog Search Results
Description
We'd like to think they're invincible, but America's power stations, water supplies, financial systems, and military communications are all vulnerable to attack. And the most pressing threat isn't from bombs or other physical dangers-it's from computer hacking. What can be done to protect our infrastructure and prevent a devastating digital assault? To find out, this CNBC Original documentary goes to the frontlines of the war on cybercrime and cyber-terrorism....
Description
Thanks in part to the documents released by Edward Snowden, the true scale of the National Security Agency's scope and power is coming to light. Besides spending billions to ingest and analyze the worlds' electronic communications, the NSA has set out to dominate a new battlefield - cyberspace. NOVA examines the science and technology behind cyber warfare and asks if we are already in the midst of a deadly new arms race.
Author
Description
"Written by former U.S. intelligence officer Dan Verton, Black Ice: The Invisible Threat of Cyber-Terrorism investigates how cyber-terrorism could occur, what the global and financial implications are, the impact this has on privacy and civil liberties, and how to prepare for and prevent cyber attacks. The book is packed with revealing interviews and commentary from leading government authorities on national security, including Tom Ridge, James Gilmore,...
Author
Description
As more and more of our daily interactions have shifted online, our lives have become more comfortable - and, in many ways, more vulnerable. The persistent insecurity of Internet activity, from spam to identity theft, affects all of us every day. And if these problems are left unchecked, their financial and emotional costs will build up to the point that we begin to turn away from this vibrant and essential tool. In Creeping Failure, world cyber security...
Author
Description
"This work examines and refines some of the common mythologies about cyber war and the role of social media in conflict, while contributing new perspective to the literature about such factors as kinetic effects and the implications of data as an information operations battlespace"--Provided by publisher.
Author
Description
This is the first book to examine cyber blockades, which are large-scale attacks on infrastructure or systems that prevent a state from accessing cyberspace, thus preventing the transmission (ingress/egress) of data. The attack can take place through digital, physical, and/or electromagnetic means, and it can be conducted by another state or a sub-state group. The purpose of this book is to understand how cyber blockades can shut down or otherwise...
Author
Description
"The book highlights international efforts in cyber environment regulation, reviews the best practices of the leading cyber powers and their controversial approaches, urges for responsible state behaviour. It also proposes information security and cyber defence solutions and suggests definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view,...
12) Cyberterror
Author
Description
"Tom Graham has spent twenty years as America's top counterterrorist operative. But this attack was something neither Graham nor America were prepared for. An attack via computer, and suddenly a new word enters the American mainstream, cyberterror. Enlisting the aid of the FBI's Karen Frost, a special agent who has never played by the rules, and Michael Patrick Ryan, Stanford computer whiz, Graham tracks one of the hackers to an address in Florida....
Author
Description
"This book examines how internet technology has become an integral part of our daily lives and as it does, the security of these systems is essential. With the ease of accessibility, the dependence to a computer has sky-rocketed, which makes security crucial"--Provided by publisher
Author
Description
"Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the fate of nations. War, tech, and politics have blurred into a new kind of battlespace that plays out on our smartphones. P.W. Singer and Emerson T. Brooking tackle...
Author
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Description
Fueled by the fastest and most pervasive Internet connections on Earth, online gaming is now a national obsession in South Korea. But while millions of people are engrossed in virtual warfare, their computers have also become very real battlegrounds, with North Korea launching Web-based assaults that disable banking, transport, and Internet portals in the south. After a discussion of gaming addiction in South Korea, this program talks with key defectors...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request