Rules of engagement
Author:
Publisher:
Varies, see individual formats and editions
Pub. Date:
2019
Language:
English
Description
A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It's only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.
Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket
Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket
Subjects
Subjects
Artificial intelligence
Artificial intelligence -- Fiction
Computer networks
Computer viruses
Computer viruses -- Fiction
Cyberterrorism
Cyberterrorism -- Fiction
Detective and mystery fiction
Fiction
Midshipmen
Midshipmen -- United States -- Fiction
Military
Military -- Fiction
Security measures
Strategic weapons systems
Strategic weapons systems -- Computer networks -- Security measures -- Fiction
Suspense fiction
Technology
Technology -- Fiction
Thrillers (Fiction)
United States Naval Academy. -- Brigade of Midshipmen -- Fiction
War fiction
Artificial intelligence -- Fiction
Computer networks
Computer viruses
Computer viruses -- Fiction
Cyberterrorism
Cyberterrorism -- Fiction
Detective and mystery fiction
Fiction
Midshipmen
Midshipmen -- United States -- Fiction
Military
Military -- Fiction
Security measures
Strategic weapons systems
Strategic weapons systems -- Computer networks -- Security measures -- Fiction
Suspense fiction
Technology
Technology -- Fiction
Thrillers (Fiction)
United States Naval Academy. -- Brigade of Midshipmen -- Fiction
War fiction
More Details
ISBN:
9781250200310
9781250223449
9781250223449
Reviews from GoodReads
Loading GoodReads Reviews.
Staff View
Grouping Information
Grouped Work ID | c38efb74-8dce-1473-d373-00d0b7df86c9 |
---|---|
Grouping Title | rules of engagement |
Grouping Author | david bruns |
Grouping Category | book |
Grouping Language | English (eng) |
Last Grouping Update | 2024-04-24 17:33:14PM |
Last Indexed | 2024-04-28 23:16:19PM |
Solr Fields
accelerated_reader_point_value
0
accelerated_reader_reading_level
0
auth_author2
Olson, J. R.
Renell, Jamie
Renell, Jamie
author
Bruns, David, 1966-
author2-role
Olson, J. R.,author
Renell, Jamie,reader
hoopla digital
Renell, Jamie,reader
hoopla digital
author_display
Bruns, David
available_at_eh
East Hampton Public Library
detailed_location_eh
East Hampton Adult Fiction
display_description
A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It's only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.
Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket
format_category_eh
Audio Books
Books
eBook
Books
eBook
format_eh
Book
eAudiobook
eAudiobook
id
c38efb74-8dce-1473-d373-00d0b7df86c9
isbn
9781250200310
9781250223449
9781250223449
itype_eh
ADULT BOOK
last_indexed
2024-04-29T05:16:19.268Z
lexile_score
-1
literary_form
Fiction
literary_form_full
Fiction
local_callnumber_eh
FIC BRU
owning_library_eh
East Hampton Public Library
owning_location_eh
East Hampton Public Library
primary_isbn
9781250200310
publishDate
2019
publisher
Macmillan Audio
St. Martin's Press
St. Martin's Press
recordtype
grouped_work
subject_facet
Artificial intelligence -- Fiction
Computer viruses -- Fiction
Cyberterrorism -- Fiction
Detective and mystery fiction
Fiction
Midshipmen -- United States -- Fiction
Military -- Fiction
Strategic weapons systems -- Computer networks -- Security measures -- Fiction
Suspense fiction
Technology -- Fiction
Thrillers (Fiction)
United States Naval Academy. -- Brigade of Midshipmen -- Fiction
War fiction
Computer viruses -- Fiction
Cyberterrorism -- Fiction
Detective and mystery fiction
Fiction
Midshipmen -- United States -- Fiction
Military -- Fiction
Strategic weapons systems -- Computer networks -- Security measures -- Fiction
Suspense fiction
Technology -- Fiction
Thrillers (Fiction)
United States Naval Academy. -- Brigade of Midshipmen -- Fiction
War fiction
title_display
Rules of engagement
title_full
Rules of Engagement [electronic resource] / J. R. Olson and David Bruns
Rules of engagement / David Bruns and J. R. Olson
Rules of engagement / David Bruns and J. R. Olson
title_short
Rules of engagement
topic_facet
Artificial intelligence
Computer networks
Computer viruses
Cyberterrorism
Midshipmen
Military
Security measures
Strategic weapons systems
Technology
Computer networks
Computer viruses
Cyberterrorism
Midshipmen
Military
Security measures
Strategic weapons systems
Technology
Solr Details Tables
item_details
Bib Id | Item Id | Shelf Loc | Call Num | Format | Format Category | Num Copies | Is Order Item | Is eContent | eContent Source | eContent URL | Detailed Status | Last Checkin | Location |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
hoopla:MWT12454491 | Online Hoopla Collection | Online Hoopla | eAudiobook | Audio Books | 1 | false | true | Hoopla | https://www.hoopladigital.com/title/12454491?utm_source=MARC&Lid=hh4435 | Available Online | |||
ils:.b26150451 | .i62977660 | East Hampton Adult Fiction | FIC BRU | 1 | false | false | On Shelf | ehaf | |||||
ils:.b26150451 | .i62965724 | Old Saybrook/Acton Adult Fiction | F BRUNS | 1 | false | false | On Shelf | osaf | |||||
ils:.b26150451 | .i62997993 | Branford/Blackstone Adult Fiction | FIC. | 1 | false | false | On Shelf | braf |
record_details
Bib Id | Format | Format Category | Edition | Language | Publisher | Publication Date | Physical Description | Abridged |
---|---|---|---|---|---|---|---|---|
hoopla:MWT12454491 | eAudiobook | Audio Books | Unabridged | English | Macmillan Audio | 2019 | 1 online resource (1 audio file (8hr., 48 min.)) : digital. | |
ils:.b26150451 | Book | Books | First edition | English | St. Martin's Press | 2019 | x, 321 pages ; 25 cm |
scoping_details_eh
Bib Id | Item Id | Grouped Status | Status | Locally Owned | Available | Holdable | Bookable | In Library Use Only | Library Owned | Holdable PTypes | Bookable PTypes | Local Url |
---|---|---|---|---|---|---|---|---|---|---|---|---|
hoopla:MWT12454491 | Available Online | Available Online | false | true | false | false | false | false | ||||
ils:.b26150451 | .i62977660 | On Shelf | On Shelf | true | true | true | false | false | true | 9999 | ||
ils:.b26150451 | .i62965724 | On Shelf | On Shelf | false | true | true | false | false | false | 9999 | ||
ils:.b26150451 | .i62997993 | On Shelf | On Shelf | false | true | true | false | false | false | 9999 |