Search Results for Cyber intelligence (Computer security)SirsiDynix Enterprisehttps://gvpl.ent.sirsidynix.net/client/en_US/default/default/qu$003dCyber$002bintelligence$002b$002528Computer$002bsecurity$002529$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2025-04-12T08:40:15ZChasing shadows : cyber espionage, subversion, and the global fight for democracyent://SD_ILS/0/SD_ILS:7950502025-04-12T08:40:15Z2025-04-12T08:40:15Zby Deibert, Ronald, author.<br/>Publication Date 2025<br/>Format: Book<br/>Call Number 364.168 DEI<br/>The ghost in the shell. The human algorithm. 3ent://SD_ILS/0/SD_ILS:6483502025-04-12T08:40:15Z2025-04-12T08:40:15Zby Fujisaku, Jun'ichi, 1967- author.<br/>Publication Date 2022<br/>Format: Book<br/>Call Number FUJ<br/>The wires of war : technology and the global struggle for powerent://SD_ILS/0/SD_ILS:6213972025-04-12T08:40:15Z2025-04-12T08:40:15Zby Helberg, Jacob, author.<br/>Publication Date 2021<br/>Format: Book<br/>Call Number 327.1 HEL<br/>Dark tomorrowent://SD_ILS/0/SD_ILS:6051842025-04-12T08:40:15Z2025-04-12T08:40:15Zby Hirsch, Reece, author.<br/>Publication Date 2020<br/>Format: Book<br/>Call Number HIR<br/>Gray day : my undercover mission to expose America's first cyber spyent://SD_ILS/0/SD_ILS:4822392025-04-12T08:40:15Z2025-04-12T08:40:15Zby O'Neill, Eric, author.<br/>Publication Date 2019<br/>Format: Book<br/>Call Number 327.1247073 ONE<br/>The assault on intelligence : American national security in an age of liesent://SD_ILS/0/SD_ILS:4719042025-04-12T08:40:15Z2025-04-12T08:40:15Zby Hayden, Michael V. (Michael Vincent), 1945- author.<br/>Publication Date 2018<br/>Format: Book<br/>Call Number 327.1273 HAY<br/>The Moscow Sleepersent://SD_ILS/0/SD_ILS:4771352025-04-12T08:40:15Z2025-04-12T08:40:15Zby Rimington, Stella, author.<br/>Publication Date 2018<br/>Format: Book<br/>Call Number RIM<br/>The ghost in the shell. Global neural networkent://SD_ILS/0/SD_ILS:4880112025-04-12T08:40:15Z2025-04-12T08:40:15Zby Gladstone, Max, author.<br/>Publication Date 2018<br/>Format: Book<br/>Call Number GHO<br/>Messing with the enemy : surviving in a social media world of hackers, terrorists, Russians, and fake newsent://SD_ILS/0/SD_ILS:4540292025-04-12T08:40:15Z2025-04-12T08:40:15Zby Watts, Clint, author.<br/>Publication Date 2018<br/>Format: Book<br/>Call Number 355.020285 WAT<br/>Man overboard [CD]ent://SD_ILS/0/SD_ILS:4086822025-04-12T08:40:15Z2025-04-12T08:40:15Zby Jance, Judith A., author.<br/>Publication Date 2017<br/>Format: CD<br/>Call Number JAN<br/>Man overboard : an Ali Reynolds novelent://SD_ILS/0/SD_ILS:4086152025-04-12T08:40:15Z2025-04-12T08:40:15Zby Jance, Judith A, author.<br/>Publication Date 2017<br/>Format: Book<br/>Call Number JAN<br/>Digimonstory cybersleuth [game (PS4)]ent://SD_ILS/0/SD_ILS:3860112025-04-12T08:40:15Z2025-04-12T08:40:15Zby Bandai Namco (Firm), publisher.<br/>Publication Date 2016<br/>Format: Digital<br/>Call Number GAME PS4 DIG<br/>Hacked : the inside story of America's struggle to secure cyberspaceent://SD_ILS/0/SD_ILS:3999222025-04-12T08:40:15Z2025-04-12T08:40:15Zby Mitchell, Charlie, 1962- author.<br/>Publication Date 2016<br/>Format: Book<br/>Call Number 384.30973 MIT<br/>So, you want to be a coder? : the ultimate guide to a career in programming, video game creation, robotics, and more!ent://SD_ILS/0/SD_ILS:4186842025-04-12T08:40:15Z2025-04-12T08:40:15Zby Bedell, J. M. (Jane M.), author.<br/>Publication Date 2016<br/>Format: Book<br/>Call Number 005.1 BED<br/>Intercept : the secret history of computers and spiesent://SD_ILS/0/SD_ILS:3082702025-04-12T08:40:15Z2025-04-12T08:40:15Zby Corera, Gordon, author.<br/>Publication Date 2015<br/>Format: Book<br/>Call Number 327.1241 COR<br/>The director : a novelent://SD_ILS/0/SD_ILS:2875562025-04-12T08:40:15Z2025-04-12T08:40:15Zby Ignatius, David, 1950-<br/>Publication Date 2014<br/>Format: Book<br/>Call Number IGN<br/>Trojan horseent://SD_ILS/0/SD_ILS:2558032025-04-12T08:40:15Z2025-04-12T08:40:15Zby Russinovich, Mark E.<br/>Publication Date 2012<br/>Format: Book<br/>Call Number RUS<br/>