Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Add Marked to Bag Add All On Page
Alternate Subjects (1-36 of 36)
Cyberterrorism
1
E-Book/E-Doc
 

Anti-Semitism across borders : hearing before the Subcommittee on Africa, Global health, Global Huma


United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Africa, Global Health, Global Human Rights, and International Organizations, author.
Washington : U.S. Government Publishing Office, 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.F 76/1:115-10    ---  Available
2
E-Book/E-Doc
 

Blackhatonomics : an inside look at the economics of cybercrime


Gragido, Will.
Amsterdam : Syngress, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
3
Print Material
 

Botnet road map status update.



[Washington, D.C.] : The Departments of Commerce and Homeland Security, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  C 1.2:B 65/2    ---  Available
4
E-Book/E-Doc
 

Brandishing cyberattack capabilities


Libicki, Martin C., author.
Santa Monica, CA : RAND Corporation, 2013. 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
5
E-Book/E-Doc
 

China's evolving approach to "integrated strategic deterrence"


Chase, Michael, author.
Santa Monica, Calif. : RAND, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
6
Print Material
 

China's position on the Sony attack : implications for the U.S. response


Wilson, Jordan (Jordan C.), author.
[Washington, D.C.] : U.S.-China Economic and Security Review Commission, 2015. 2015

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 3.2:C 44/SO 4    ---  Available
7
Print Material
 

Chinese state-sponsored actors exploit publicly known vulnerabilities.



[Fort Meade, MD] : National Security Agency, 2020. 2020

Rating:

Copies

8
Print Material
 

Colonial Pipeline : the DarkSide strikes


Parfomak, Paul W., author.
[Washington, D.C.] : Congressional Research Service, 2021- 2021

Rating:

Copies

9
Print Material
 

Continuation of the national emergency with respect to specified harmful foreign activities of the G


United States. President (2021- : Biden), author.
Washington : U.S. Government Publishing Office, 2022. 2022

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/7:117-112    ---  Available
10
Print Material
 

Continuation of the national emergency with respect to specified harmful foreign activities of the G


United States. President (2021- : Biden), author.
Washington : U.S. Government Publishing Office, 2023. 2023

Rating:

Copies

11
Print Material
 

Critical infrastructure policy : information sharing and disclosure requirements after the Colonial


Humphreys, Brian E., author.
[Washington, D.C.] : Congressional Research Service, 2021- 2021

Rating:

Copies

12
Print Material
 

Cyber incident severity schema.


United States. President (2009-2017 : Obama), author.
[Washington, D.C.] : [The White House], [2016?] 2016

Rating:

Copies

13
Print Material
 

Cybercrime : an overview of the Federal Computer Fraud and Abuse Statute and related federal crimina


Doyle, Charles, author.
[Washington, D.C.] : Congressional Research Service, 2019- 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.23:97-1025/    ---  Available
14
E-Book/E-Doc
 

Cyberspace : malevolent actors, criminal opportunities, and strategic competition



Carlisle Barracks, PA : Strategic Studies Institute and U.S. Army War College Press, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146:C 99/7    ---  Available
15
Print Material
 

Cyberwarfare and cyberterrorism : in brief


Theohary, Catherine A., author.
[Washington, D.C.] : Congressional Research Service, [2018?]- 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.23:R 43955/    ---  Available
16
Print Material
 

Department of Justice efforts to counter ransomware


Finklea, Kristin M., author.
[Washington, D.C.] : Congressional Research Service, 2021- 2021

Rating:

Copies

17
E-Book/E-Doc
 

Directing the Secretary of Homeland Security to transmit certain documents to the House of Represent


United States. Congress. House. Committee on Homeland Security, author.
[Washington, D.C.] : [U.S. Government Publishing Office], 2017. 2017

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 1.1/8:115-89    ---  Available
18
Print Material
 

Fact sheet, presidential policy directive on United States cyber incident coordination.


United States. Office of the White House Press Secretary, author.
[Washington, D.C.] : The White House, Office of the Press Secretary, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  PREX 1.24:C 99/2    ---  Available
19
E-Book/E-Doc
 

Getting to Yes with China in Cyberspace


Harold, Scott Warren, author.
Santa Monica, Calif. : RAND, [2016] 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
20
E-Book/E-Doc
 

Hacking a terror network : the silent threat of covert channels


Rogers, Russ.
Rockland, Mass. : Syngress Pub., ©2005. 2005

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
21
E-Book/E-Doc
 

Implementing homeland security for enterprise IT


Erbschloe, Michael.
Boston : Digital Press, 2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
22
E-Book/E-Doc
 

Introduction to cyber-warfare : a multidisciplinary approach


Shakarian, Paulo.
Amsterdam [Netherlands] : Morgan Kaufmann Publishers, an imprint of Elsevier, [2013] 2013

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
23
Print Material
 

Iranian offensive cyberattack capabilities


Theohary, Catherine A., author.
[Washington, D.C.] : Congressional Research Service, 2020- 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.24:IF 11406/    ---  Available
24
Print Material
 

Legality in cyberspace : an adversary view


Giles, Keir, author.
Carlisle, PA : Strategic Studies Institute and U.S. Army War College Press, 2014. 2014

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146/3:L 52    ---  Available
25
Print Material
 

Lights out : a cyberattack, a nation unprepared, surviving the aftermath


Koppel, Ted, 1940 February 8-
New York : Crown Publishers, [2015] 2015

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe 3rd Floor Stacks  363.119333 K839l 2015    ---  Available
26
E-Book/E-Doc
 

Copies

Location Call No. OPAC Message Status
 Axe JSTOR Open Ebooks  Electronic Book    ---  Available
27
Print Material
 

Occupying the information high ground : Chinese capabilities for computer network operations and cyb


Krekel, Bryan A., author.
[Washington, D.C.] : U.S.-China Economic and Security Review Administration, 2012. 2012

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 3.2:C 44/OC 1    ---  Available
28
Print Material
 

Outlaw regime : a chronicle of Iran's destructive activities.



[Washington, D.C.] : Iran Action Group, U.S. Department of State, 2020. 2020

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  S 1.2:IR 1/2/2020    ---  Available
29
Print Material
 

Revolutionary risks : cyber technology and threats in the 2011 Libyan Revolution


Scott-Railton, John, author.
Newport, Rhode Island : Center on Irregular Warfare and Armed Groups, U.S. Naval War College, 2021. 2021

Rating:

 

Copies

Location Call No. OPAC Message Status
 Axe Archives Fed Docs  D 208.215/2:3    ---  Available
30
Print Material
 

Revolutionary risks : cyber technology and threats in the 2011 Libyan Revolution


Scott-Railton, John, author.
Newport, Rhode Island : Center on Irregular Warfare and Armed Groups, U.S. Naval War College, 2021. 2021

Rating:

Copies

31
Print Material
 

Russian disinformation attacks on elections : lessons from Europe : hearing before the Subcommittee


United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Europe, Eurasia, Energy, and the Environment, author.
Washington : U.S. Government Publishing Office, 2019. 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.F 76/1:116-55    ---  Lib Use Only
32
E-Book/E-Doc
 

Stealing the network : how to own a continent



Rockland, MA : Syngress, ©2004. 2004

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
33
E-Book/E-Doc
 

Stealing the network : how to own a shadow: the chase for Knuth


Long, Johnny.
Rockland, Mass. : Syngress, 2007. 2007

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
34
Print Material
 

Terrorist capabilities for cyberattack: overview and policy issues


Rollins, John, author.
[Washington, D.C.] : Congressional Research Service, [2018?]- 2018

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  LC 14.23:RL 33123/    ---  Available
35
Print Material
 

Undermining democracy : Kremlin tools of malign political influence : hearing before the Subcommitte


United States. Congress. House. Committee on Foreign Affairs. Subcommittee on Europe, Eurasia, Energy, and the Environment, author.
Washington : U.S. Government Publishing Office, 2019. 2019

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  Y 4.F 76/1:116-41    ---  Available
36
Print Material
 

United States cyber incident coordination.


United States. President (2009-2017 : Obama), author.
[Washington, D.C.] : The White House, Office of the Press Secretary, 2016. 2016

Rating:

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  PR 44.2:C 99/2    ---  Available
Add Marked to Bag Add All On Page
Locate in results
 
    
Available items only