Net force: attack protocol
(Book)
Description
The cutting-edge Net Force thriller series, created by Tom Clancy and Steve Pieczenik and written by Jerome Preisler, reveals the invisible battlefield where the war for global dominance is fought. The president's new cybersecurity team, Net Force, is up and running. But a political deadlock in Washington makes the young agency dangerously vulnerable to the criminals, terror groups and hostile governments who would use the digital space to advance their destructive goals. In Central Europe, an unknown enemy mounts a crippling high-tech assault against the organization's military threat-response unit on its home base. The strike casts suspicion on a core member of Net Force, threatening to destroy the cyber defense group from within. But as they race to track down their attackers, the stakes are suddenly ratcheted higher. For a global syndicate of black hat hackers and a newly belligerent Russia are hatching a mysterious, shadowy scheme for world domination from a place known only as the Secret City. Their attack protocol: leave Net Force in ashes while Moscow and its Dark Web allies set the stage for a devastating strike against the United States. Unless the men and women of Net Force can regroup in time to stop them.
Copies
Subjects
More Details
Notes
Reviews from GoodReads
Citations
Preisler, J., Clancy, T., & Pieczenik, S. R. (2020). Net force: attack protocol. Hanover Square Press.
Chicago / Turabian - Author Date Citation (style guide)Preisler, Jerome, Tom Clancy and Steve R., Pieczenik. 2020. Net Force: Attack Protocol. Hanover Square Press.
Chicago / Turabian - Humanities Citation (style guide)Preisler, Jerome, Tom Clancy and Steve R., Pieczenik, Net Force: Attack Protocol. Hanover Square Press, 2020.
MLA Citation (style guide)Preisler, Jerome,, et al. Net Force: Attack Protocol. Hanover Square Press, 2020.
Staff View
Record Information
| Last Sierra Extract Time | Oct 16, 2025 12:26:01 AM |
|---|---|
| Last File Modification Time | Oct 16, 2025 12:26:14 AM |
| Last Grouped Work Modification Time | Oct 16, 2025 12:26:06 AM |
MARC Record
| LEADER | 02419nam a2200277 i 4500 | ||
|---|---|---|---|
| 005 | 20250210230144.0 | ||
| 008 | 200929s2020 onc e 000 1 eng d | ||
| 020 | |a 9781335080783 | ||
| 020 | |a 1335080783 | ||
| 040 | |a EOW |b eng |e rda |c EOW | ||
| 100 | 1 | |a Preisler, Jerome, |e author. |0 http://id.loc.gov/authorities/names/no95025011 | |
| 245 | 1 | 0 | |a Net force : |b attack protocol / |c series created by Tom Clancy and Steve Pieczenik ; written by Jerome Preisler. |
| 264 | 1 | |a Toronto, Ontario : |b Hanover Square Press, |c 2020] | |
| 300 | |a 413 pages ; |c 19 cm | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a unmediated |b n |2 rdamedia | ||
| 338 | |a volume |b nc |2 rdacarrier | ||
| 520 | |a The cutting-edge Net Force thriller series, created by Tom Clancy and Steve Pieczenik and written by Jerome Preisler, reveals the invisible battlefield where the war for global dominance is fought. The president's new cybersecurity team, Net Force, is up and running. But a political deadlock in Washington makes the young agency dangerously vulnerable to the criminals, terror groups and hostile governments who would use the digital space to advance their destructive goals. In Central Europe, an unknown enemy mounts a crippling high-tech assault against the organization's military threat-response unit on its home base. The strike casts suspicion on a core member of Net Force, threatening to destroy the cyber defense group from within. But as they race to track down their attackers, the stakes are suddenly ratcheted higher. For a global syndicate of black hat hackers and a newly belligerent Russia are hatching a mysterious, shadowy scheme for world domination from a place known only as the Secret City. Their attack protocol: leave Net Force in ashes while Moscow and its Dark Web allies set the stage for a devastating strike against the United States. Unless the men and women of Net Force can regroup in time to stop them. | ||
| 650 | 0 | |a Cyberterrorism |v Fiction. | |
| 650 | 0 | |a Hacking |v Fiction. | |
| 655 | 7 | |a Thrillers (Fiction) |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026571 | |
| 700 | 1 | |a Clancy, Tom, |d 1947-2013, |e creator. |0 http://id.loc.gov/authorities/names/n84030721 | |
| 700 | 1 | |a Pieczenik, Steve R., |e creator. |0 http://id.loc.gov/authorities/names/n85105668 | |
| 907 | |a .b27072629 | ||
| 945 | |y .i67007995 |i 21204071027 |l nwakf |s - |h |u 2 |x 0 |w 0 |v 0 |t 16 |z 03-29-22 |o - |a PA P [Fiction] | ||
| 998 | |e - |d a |f eng |a nw | ||




