Catalog

Record Details

Catalog Search



Rules of engagement  Cover Image Book Book

Rules of engagement / David Bruns and J. R. Olson.

Bruns, David, 1966- (author.). Olson, J. R., (author.).

Summary:

A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It's only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.
Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket

Available copies

  • 1 of 1 copy available at Potter-Tioga Library System. (Show)
  • 1 of 1 copy available at Ulysses Library Association.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Ulysses Library Association F BRU (pb) (Text) 30863000147178 Adult Fiction Available -

LDR 04060cam a2200565 i 4500
00111546874
003True
00520221117234244.0
008190202s2019 nyu 000 1 eng
010 . ‡a 2019001793
015 . ‡aGBB982988 ‡2bnb
0167 . ‡a019393565 ‡2Uk
019 . ‡a1104789804
020 . ‡9781250253224 (pbk)
0291 . ‡aUKMGB ‡b019393565
0291 . ‡aAU@ ‡b000065319068
0291 . ‡aCHVBK ‡b568853822
0291 . ‡aCHBIS ‡b011422674
035 . ‡a(NOBLE)4331468
035 . ‡a(OCoLC)4331468
035 . ‡aon1048939425
035 . ‡a(OCoLC)1048939425 ‡z(OCoLC)1104789804
040 . ‡aDLC ‡beng ‡erda ‡cDLC ‡dNZLEP ‡dUKMGB ‡dIK2 ‡dGK8 ‡dCG4 ‡dORX ‡dNZAUC ‡dDLC ‡dOCLCF ‡dOCLCO ‡dTXSCH ‡dILC ‡dUtOrBLW
042 . ‡apcc
043 . ‡an-us--- ‡0http://id.loc.gov/vocabulary/geographicAreas/n-us
05000. ‡aPS3602.R859 ‡bR85 2019
08200. ‡a813/.6 ‡223
1001 . ‡aBruns, David, ‡d1966- ‡eauthor. ‡0n 2019005947 ‡0(True)376516
24510. ‡aRules of engagement / ‡cDavid Bruns and J. R. Olson.
250 . ‡aFirst edition.
264 1. ‡aNew York : ‡bSt. Martin's Press, ‡c2019.
300 . ‡372 p.
336 . ‡atext ‡btxt ‡2rdacontent
337 . ‡aunmediated ‡bn ‡2rdamedia
338 . ‡avolume ‡bnc ‡2rdacarrier
520 . ‡aA terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It's only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.
520 . ‡aRafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket
650 0. ‡aCyberterrorism ‡vFiction. ‡0sh 00001974
650 0. ‡aStrategic weapons systems ‡xComputer networks ‡xSecurity measures ‡vFiction. ‡0sh 95009928
650 0. ‡aComputer viruses ‡vFiction. ‡0sh2009121238 ‡0(True)703812
650 0. ‡aArtificial intelligence ‡vFiction. ‡0sh2008117622 ‡0(True)696841
61020. ‡aUnited States Naval Academy. ‡bBrigade of Midshipmen ‡vFiction. ‡0n 79106933
650 0. ‡aMidshipmen ‡zUnited States ‡vFiction. ‡0sh2004009949
650 7. ‡aTerrorists ‡vFiction. ‡2sears ‡0(True)694086
650 7. ‡aComputer viruses ‡vFiction. ‡2sears ‡0(True)703812
655 7. ‡aSuspense fiction. ‡2gsafd
655 7. ‡aWar fiction. ‡2lcgft ‡0gf2014026590 ‡0(True)704
655 7. ‡aThrillers (Fiction) ‡2lcgft ‡0gf2014026571 ‡0(True)692
7001 . ‡aOlson, J. R., ‡eauthor. ‡0n 2019005948 ‡0(True)376517
901 . ‡a11546874 ‡b ‡c11546874 ‡tbiblio

Additional Resources