Filter By Subjects
Computer crimes Fiction Computer hackers Fiction Computer networks Security measures Fiction Cyber intelligence (Computer security) Fiction Cyberterrorism Fiction Moles (Spies) Fiction Suspense fiction United States. Central Intelligence Agency Fiction United States. Central Intelligence Agency Officials and employees FictionFilter By Authors
Ignatius, DavidFilter By Subjects
Computer crimes Fiction Computer hackers Fiction Computer networks Security measures Fiction Cyber intelligence (Computer security) Fiction Cyberterrorism Fiction Moles (Spies) Fiction Suspense fiction United States. Central Intelligence Agency Fiction United States. Central Intelligence Agency Officials and employees FictionFilter By Authors
Ignatius, DavidIgnatius, David
Summary: "Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center....
Format: text
Publisher / Publication Date: W W Norton 2014
Copies Available at Peninsula
1 available in Adult Fiction, Call number: FIC IGNIgnatius, David
Summary: Spies don't bother to steal information. They change it, permanently and invisibly. Graham Weber has been director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber isn' t sure where to turn until...
Format: sound recording-nonmusical
Publisher / Publication Date: 2014