Mike Mitchell, an average New Yorker already struggling to keep his family together, suddenly finds himself fighting just to keep them alive when an increasingly bizarre string of disasters starts appearing on the world's news networks. As both the real world and the cyberworld come crashing down, bending perception and reality, a monster snowstorm cuts New York off from the world, turning it into a wintry tomb where nothing is what it seems.
Author: Gloria Skurzynski
Publisher: Simon & Schuster Books For Young Readers
Release Date: 1995
In 2015, when Darcy Kane moves to another part of town, she discovers that the Animal Control Division is trying to take her dog away and that the most obvious escape is into her neighbor's Virtual Reality Rent-a-Memory machine.
Author: Shane Mooney
Publisher: Prima Games
Release Date: 1998
Learn to rip victory from the cold metal hands of computer and human opponents! Advice for engineering better bioderms Breakdowns of the HERCs you'll use in battle Strategies for multiplayer internet games
Book 1 of the Atopia Series! In the near future, to escape the crush and clutter of a packed and polluted Earth, the world s elite flock to Atopia, an enormous corporate-owned artificial island in the Pacific Ocean. It is there that Dr. Patricia Killiam rushes to perfect the ultimate in virtual reality: a program to save the ravaged Earth from mankind s insatiable appetite for natural resources. A strong narrative with several distinct voices propels the listener through this brave new world, painting a powerful and compelling vision of a society that promises everyone salvation with passage to an addictive, escapist alternative reality."
Author: John Sauer
Publisher: Prima Games
Release Date: 1996
Players command combat in a robot-based universe with a myriad of futuristic weapons and battle systems. This strategic/tactical futuristic warfare simulation combines classic strategy with the interactivity and randomness of simulation games. Let this book be your guide.
Author: Matthew Mather
Publisher: Matthew Mather Ulc
Release Date: 2015-08-12
Something big is coming... Big enough to destroy the entire solar system... And it's heading straight for Earth. That's what Dr. Ben Rollins, head of Harvard's exoplanet research team, is told by NASA after being dragged out of bed in the middle of the night. His first instinct is to call his daughter, Jessica, who's vacationing in Italy with his wife: something is coming, he tells them, a hundred times the mass of our sun. We can't see it, we don't know what it is, but it's there. They're calling it Nomad, and the Earth may be destroyed in months. "Set firmly in the realm of God-I-hope-not science fiction, Mather grounds his story in hard facts, weaving a story that is all too plausible, gritty and realistic." - Peter Cawdron, bestselling author of Anomaly But what is it? And how did they miss detecting it until now? In a frantic race against time, Dr. Rollins must unravel Nomad's secrets. A mysterious clue surfaces in his old research papers from the end of the Cold War, more than thirty years before... The world erupts into chaos as the end approaches-and Ben discovers that his wife and daughter are trapped in Europe. The key to humanity's survival may rest in the final answers he pieces together, in the midst of his desperate scramble across continents to find his family before Nomad swallows the planet. "An instant classic of the apocalyptic genre, a petrifyingly wild ride." - A.C. Hadfield, bestselling author of The Atlantis Ship. MORE ABOUT NOMAD For lovers of apocalyptic fiction, Nomad is the disaster story to end them all, a cataclysm all the more plausible and terrifying as the science behind it is vetted by a team of world-class astrophysicists from CERN, SETI, the Keck Observatory and more. It even comes with its own simulation video, for those interested. Nomad comes from the mind of award-winning, Amazon Best-Seller Matthew Mather, whose books have sold a half million copies and been translated into sixteen languages, with 20th Century Fox developing his second novel, CyberStorm, for film.
Author: Steven T. Wieland
Release Date: 2012
Genre: Cyberspace operations (Military science)
This study examines what the military should do to be resilient against cyber attacks. Its basis rests on two major assumptions. First, it assumes the United States' adversaries will attempt to use attacks against the military. Second, it assumes some of these attacks will be successful despite established defenses. The military must be prepared to continue its mission despite cyber attacks."--Abstract.
Author: Susan W. Brenner
Publisher: Oxford University Press
Release Date: 2009
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions; who should respond, and how?; how should nation-states effectively deal with a cyber-attack?; and will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless? In Cyberthreats: The Emerging Fault Lines of the Nation State Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible.
Author: Gloria Skurzynski
Publisher: Simon and Schuster
Release Date: 2010-05-11
Genre: Juvenile Fiction
Imagine a life of virtual reality -- a childhood contained in a controlled environment, with no human contact or experiences outside of the world of computer-generated images. Corgan has been genetically engineered by the Federation for quick reflexes, high intelligence, and physical superiority. Everything Corgan is, everything he has ever seen or done, was to prepare him for one moment: a bloodless, computer-controlled virtual war. When Corgan meets his two fellow warriors, he begins to question the Federation. Now Corgan must decide where his loyalties lie, what he's willing to fight for, and exactly what he wants in return. His decisions will affect not only these three virtual warriors, but all the people left on earth.
Author: David A. Powner
Publisher: DIANE Publishing
Release Date: 2009-03-01
The Dept. of Homeland Security (DHS) is the focal point for the security of cyberspace. DHS is required to coordinate cyber attack exercises to strengthen public and private incident response capabilities. One major exercise program, called Cyber Storm, is a large-scale simulation of multiple concurrent cyber attacks involving the fed. gov¿t., states, foreign gov¿ts., and private industry. DHS has conducted Cyber Storm exercises in 2006 and 2008. This report: (1) identifies the lessons that DHS learned from the first Cyber Storm exercise; (2) assesses DHS¿s efforts to address the lessons learned from this exercise; and (3) identifies key participants¿ views of their experiences during the second Cyber Storm exercise. Includes recommendations. Illus.
Robert Baxter once reveled in the intoxicating delights of Atopia—the man-made island where humans lose themselves in a world of boundless virtual realities. Now, Bob has returned to immerse himself in this mind-altering, consciousness-sharing refuge from the eroding Earth. But something is very wrong. Bob feels a tidal wave of doom cresting above the pleasure dome that is Atopia. As alternate universes perish, the salvation of all he loves—and all that exists—rests with Bob alone. To save the future, he must journey to the farthest edge of the past, where existence itself began and Atopia’s deepest secrets may lie. Yet even the knowledge Bob ultimately gains may not be a match for an enemy as powerful as a god, and as all-consuming as death . . .
Author: Edward Amoroso
Release Date: 2012-03-29
Genre: Business & Economics
Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume thus serves as an attractive framework for a new national strategy for cyber security. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. In this edition, each principle is presented as a separate security strategy and illustrated with compelling examples. The book adds 50-75 pages of new material aimed specifically at enhancing the student experience and making it more attractive for instructors teaching courses such as cyber security, information security, digital security, national security, intelligence studies, technology and infrastructure protection. It now also features case studies illustrating actual implementation scenarios of the principles and requirements discussed in the text, along with a host of new pedagogical elements, including chapter outlines, chapter summaries, learning checklists, and a 2-color interior. Furthermore, a new and complete ancillary package includes test bank, lesson plans, PowerPoint slides, case study questions, and more. This text is intended for security practitioners and military personnel as well as for students wishing to become security engineers, network operators, software designers, technology managers, application developers, etc. Provides case studies focusing on cyber security challenges and solutions to display how theory, research, and methods, apply to real-life challenges Utilizes, end-of-chapter case problems that take chapter content and relate it to real security situations and issues Includes instructor slides for each chapter as well as an instructor’s manual with sample syllabi and test bank
An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction. At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe. Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today---it's a cataclysmic disaster just waiting to happen.