An edition of Cyber Insecurity (2018)

Cyber Insecurity

  • 1 Want to read
  • 1 Currently reading
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 1 Want to read
  • 1 Currently reading

Buy this book

Last edited by PhilPearl
May 21, 2018 | History
An edition of Cyber Insecurity (2018)

Cyber Insecurity

  • 1 Want to read
  • 1 Currently reading

Cyber Insecurity is a novel that follows the lives of its two main characters, Janie and Dave, as they negotiate the world of online criminals and undeclared cyber warfare between nation states. The book is based on real people, places, devices, and events, from a collision between Russian and American nuclear submarines, to North Korea's testing of Hydrogen bombs and Inter-Continental Ballistic Missiles.

You are taken on a tour through the murky world of Malware, Bots, Viruses, Ransomware, Cyber Security, and Spying, as Cyber crooks steal identities, hack Government web sites, and wreck trains. And that's just scratching the surface.
The story of the contemporary American political scene is told, where interference by Russia in the Presidential election puts a crooked businessman in the White House. Then the new President fires the FBI Director who is conducting an investigation into Russian influence.

And just as in the real world, it's up to you to decide which parts of the story are factual and what's fictional.

Publish Date
Publisher
Self-published
Language
English
Pages
344

Buy this book

Edition Availability
Cover of: Cyber Insecurity
Cyber Insecurity
2018, Self-published
Paperback in English

Add another edition?

Book Details


Table of Contents

Part I
Chapter 1. Interview
Page 1
Chapter 2. Night in New York
Page 21
Chapter 3. CIA / ESP
Page 25
Chapter 4. Family Matters
Page 37
Chapter 5. Sig
Page 41
Chapter 6. Charlie Rowes Rule
Page 49
Chapter 7. All Fired Up
Page 53
Chapter 8. NCIS
Page 65
Chapter 9. Trouble in Paradise
Page 71
Chapter 10. Retaliation
Page 79
Chapter 11. Encryption
Page 89
Part II
Chapter 12. Just Deserts
Page 95
Chapter 13. U.S.K.
Page 103
Chapter 14. Con
Page 107
Chapter 15. Sting
Page 119
Chapter 16. CDS
Page 127
Chapter 17. Insulin
Page 135
Chapter 18. Dinosaur
Page 141
Chapter 19. Train Ransomware
Page 147
Chapter 20. Stuxnet Redux
Page 157
Chapter 21. Morpheus
Page 161
Chapter 22. Frigid Betrayal
Page 167
Chapter 23. Hawaii Alert
Page 181
Part III
Chapter 24. Rise of the Script Bots
Page 189
Chapter 25. Anti-Virus Takeover
Page 197
Chapter 26. Multiple Meltdowns
Page 203
Chapter 27. Virus Virthem
Page 209
Chapter 28. The Spying Dutchman
Page 217
Chapter 29. NATO Intervenes
Page 227
Chapter 30. Five-eyed Wardens
Page 231
Chapter 31. Quantum Mechanics
Page 239
Chapter 32. Laboratory
Page 253
Chapter 33. Nobel Prize
Page 261
Chapter 34. Needs of the Few
Page 267
Chapter 35. Deep Dark Web
Page 275
Chapter 36. Adaptive Protection
Page 281
Chapter 37. Backfire
Page 287
Chapter 38. Oh, Those Russians
Page 293
Chapter 39. Swap
Page 303
Chapter 40. UNSecure
Page 311
Chapter 41. Misguided Missile
Page 321
Chapter 42. Poisson
Page 327
Chapter 43. The Last Chapter
Page 339

Edition Notes

Published in
Kent, WA, USA

The Physical Object

Format
Paperback
Number of pages
344
Dimensions
8 x 5 x 0.9 inches
Weight
1 pounds

ID Numbers

Open Library
OL26451922M

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
May 21, 2018 Edited by PhilPearl Extra info
May 21, 2018 Edited by PhilPearl New book
May 21, 2018 Created by PhilPearl Added new book.