Catalog Search Results
Author
Language
English
Description
A hyper-fast quantum computer is the digital equivalent of a nuclear bomb: whoever possesses one will be able to shred any encryption in existence, effectively owning the digital world. The question is: Who will build it first, the United States or China? The latest of David Ignatius's timely, sharp-eyed espionage novels follows CIA agent Harris Chang into a quantum research lab compromised by a suspected Chinese informant. The breach provokes a mole...
Author
Publisher
Farrar, Straus and Giroux
Pub. Date
2023.
Language
English
Description
"A law professor and computer expert's take on how hacks happen and how the Internet can be made more secure"--
It's a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the...
Author
Publisher
Pegasus Books
Pub. Date
2016.
Language
English
Appears on list
Description
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
Author
Publisher
Crown Publishers, an imprint of the Crown Publishing Group
Pub. Date
[2018]
Language
English
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Publisher
Sony Pictures Home Entertainment
Pub. Date
[2016]
Language
English
Description
Notorious hacker Drew Reynolds is captured by the CIA and given a proposition, work for them or spend the rest of his life in prison. Agreeing on the condition that he can form his own team, he puts together a group of 'throwaways,' the people deemed expendable and seemingly the worst in the organization.
Author
Publisher
Praeger, an imprint of ABC-CLIO, LLC
Pub. Date
[2016]
Language
English
Description
"The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking--principally the Internet--are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then...
Author
Series
CSR volume no. 56
Publisher
Council on Foreign Relations
Pub. Date
c2010
Language
English
Publisher
The Council of Economic Advisers, Executive Office of the President of the United States
Pub. Date
2018.
Language
English
Description
This report examines the substantial economic costs that malicious cyber activity imposes on the U.S. economy. Cyber threats are ever-evolving and may come from sophisticated adversaries. Due to common vulnerabilities, instances of security breaches occur across firms and in patterns that are difficult to anticipate. Importantly, cyberattacks and cyber theft impose externalities that may lead to rational underinvestment in cybersecurity by the private...
Author
Publisher
Hachette Books
Pub. Date
2018.
Language
English
Description
A provocative, comprehensive analysis of Vladimir Putin and Russia's master plan to destroy democracy in the age of Donald Trump. In the greatest intelligence operation in the history of the world, Donald Trump was made President of the United States with the assistance of a foreign power. For the first time, The Plot to Destroy Democracy reveals the dramatic story of how blackmail, espionage, assassination, and psychological warfare were used...