Catalog Search Results
Author
Pub. Date
2016.
Language
English
Formats
Description
"An unprecedented high-level master narrative of America's intelligence wars, from the only person ever to helm both the CIA and the NSA, at a time of heinous new threats and momentous change For General Michael Hayden, playing to the edge means playing so close to the line that you get chalk dust on your cleats. Otherwise, by playing back, you may protect yourself, but you will be less successful in protecting America. "Play to the edge" was Hayden's...
Author
Pub. Date
2018.
Language
English
Formats
Description
This critique of the forces threatening the American intelligence community, beginning with President Trump himself, outlines how the country's democratic structures and processes are under stress and discusses effective responses.
"In the face of a President who lobs accusations without facts, evidence, or logic, truth tellers are under attack. Meanwhile, the world order is teetering on the brink. North Korea is on the verge of having a nuclear...
Author
Pub. Date
2020.
Language
English
Formats
Description
"John Bolton served as National Security Advisor to President Donald Trump for 519 days. A seasoned public servant who had previously worked for Presidents Reagan, Bush #41, and Bush #43, Bolton brought to the administration thirty years of experience in international issues and a reputation for tough, blunt talk. In his memoir, he offers a substantive and factual account of his time in the room where it happened."--
Author
Series
Pub. Date
2014.
Language
Español
Description
La seguridad es una aspiración universal a la que ningún país puede renunciar. En un mundo en permanente transformación, las fuentes de tensión y riesgo se suceden y multiplican incesantemente: terrorismo, conflictos armados, amenazas cibernéticas, crisis financieras y energéticas, criminalidad organizada, espionaje, armas de destrucción masiva, piratería, catástrofes naturales o riesgos ambientales, entre otras muchas. La persistencia...
Author
Language
English
Description
Edward Snowden, the man who risked everything to expose the US government's system of mass surveillance, reveals for the first time the story of his life, including how he helped to build that system and what motivated him to try to bring it down. In 2013, twenty-nine-year-old Edward Snowden shocked the world when he broke with the American intelligence establishment and revealed that the United States government was secretly pursuing the means to...
7) Red sparrow
Pub. Date
[2018]
Language
English
Description
Ballerina Dominika Egorova is recruited to Sparrow School, a Russian intelligence service where she is forced to use her body as a weapon. Her first mission, targeting a C.I.A. agent, threatens to unravel the security of both nations.
Author
Series
Jack McClure novels volume 5
Language
English
Description
"In the stunning follow-up to Father Night, Jack McClure faces a choice: help the woman he loves, or destroy her as the enemy she is. Shortly after McClure leaves a late night meeting with Dennis Paull, the Secretary of Homeland Security, Paull is found--shot dead. The President is furious but equally frightened of a scandal, since Jack McClure is one of their own--an operative and Paull's friend. Who will protect the country if even McClure cannot...
Author
Pub. Date
2016.
Language
English
Description
Learn how to build a defense program against insider threats Insiders are not always employees and insider threats are not always intentional. This new title from Dr Julie Mehan looks beyond perimeter protection tools and shows how a security culture based on international best practice can help mitigate the insider threat to your security. Discover: The common characteristics of insider threat victims. The typical stages of a malicious attack. The...
Author
Series
Pub. Date
2012
Language
English
Description
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses...
Author
Series
Joe DeMarco thrillers volume 6
Language
English
Formats
Description
When the NSA records the murder of two American civilians while conducting illegal wiretapping operations, political fixer Joe DeMarco finds himself rendered a pawn in a lethal game between a master spy and a four-star army general.
Author
Pub. Date
[2016]
Language
English
Appears on list
Description
NSA director Theodore Anders has a simple goal: collect every phone call, email, and keystroke tapped on the Internet. He knows unlimited surveillance is the only way to keep America safe. Evelyn Gallagher doesn't care much about any of that. She just wants to keep her head down and manage the NSA's camera network and facial recognition program so she can afford private school for her deaf son, Dash. But when Evelyn discovers the existence of a program...
Author
Series
Hardy Boys mystery stories volume 49
Pub. Date
[1970]
Language
English
Description
The Hardy boys dial a wrong number, get the Pentagon, and suddenly find themselves in a dangerous adventure involving national security.
15) 24: Season four
Pub. Date
[2005]
Language
English
Description
Many familiar faces return for this day of crisis. A fearsome new villain is played with cold-hearted intensity. The threat this time around is much different, and for Jack Bauer there are multiple situations to deal with. Jack has to make some extremely difficult choices, including how to handle a new love in his life who happens to be the daughter of the Secretary of Defense. Their new found love will be put to the ultimate test during the next...
Author
Language
English
Formats
Description
"In the first week of June 2013, the American people discovered that for a decade, they had abjectly traded their individual privacy for the chimera of national security. The revelation that the federal government has full access to all phone records and the vast trove of presumably private personal data posted on the Internet has brought the threat of a surveillance society to the fore. But the erosion of privacy rights extends far beyond big government....
Pub. Date
[2023]
Language
English
Description
IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses...
Author
Series
Harry Bosch mysteries volume 13
Pub. Date
2007.
Language
English
Description
A body has been found on the overlook near Mulholland Dr. The victim, Dr. Stanley Kent, has two bullet holes in the back of his head from what looks like an execution-style shooting. LAPD detective Harry Bosch is called out to investigate. What begins as a routine homicide investigation opens up before Bosch into something much more dangerous, and urgent.
Pub. Date
2022.
Language
English
Description
Welcome to Audio Learning from Assemble You. Hackers conduct cyber attacks to steal information, sabotage one or more systems, or bring down a working network. They can also attack several systems at once, gain control, and use these systems to initiate another attack on a different network altogether. In this track, we'll learn about social engineering, malware, ransomware, distributed denial of service, Man-in-the-middle (MITM) attacks, insider...
20) 24: Season five
Pub. Date
[2006]
Language
English
Description
"Eighteen months after faking his own death, Jack Bauer returns to L.A. when it becomes clear that the only four people who know he is still alive are being targeted for assassination. The killings coincide with the signing of an anti-terrorism treaty with Russia, leading Jack to suspect a link between the assassinations, the treaty, and a group of Russian terrorists. But as the terror unfolds, Jack learns the day's events were set in motion by an...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request