Catalog

Record Details

Catalog Search



Rules of engagement  Cover Image Book Book

Rules of engagement / David Bruns and J. R. Olson.

Bruns, David, 1966- (author.). Olson, J. R., (author.).

Summary:

A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It's only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.
Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket

Available copies

  • 1 of 1 copy available at Potter-Tioga Library System. (Show)
  • 1 of 1 copy available at Ulysses Library Association.

Holds

  • 0 current holds with 1 total copy.
Show Only Available Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Ulysses Library Association F BRU (pb) (Text) 30863000147178 Adult Fiction Available -

Summary: A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It's only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.
Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket

Additional Resources