Cyber Knights 1.1


Book Description

Cyber Knights 1.1 is the second part in a stunning two-part collection of stories based on true-life cyber vulnerabilities, by Harold Coyle and Jennifer Ellis Here be Dragons. In the Age of Discovery, unexplored areas of a map were often marked with this warning. Today, such a warning could easily be applied to the internet. Hackers and cyber assassins present a constant threat to individuals, companies, and institutions. Protecting these targets requires a new kind of warrior, a cyber knight armed with the skills, weapons, and savvy needed to slay today’s dragons. One such digital warrior is Andy Webb, a former British Army officer. Together with Karen Spencer, a shy, twenty-something American who is a wizard when it comes to software, and Tommy Tyler, a rough and ready ex-soldier and hardware expert, Webb forms Century Consultants. The cyber security firm must work to defend its clients from the hackers, criminals and hired cyber assassins who seek out victims on the world wide web. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.




Cyber Knights 1.0


Book Description

A stunning collection of stories based on true-life cyber vulnerabilities, presented in two parts Here be Dragons. In the Age of Discovery, unexplored areas of a map were often marked with this warning. Today, such a warning could easily be applied to the internet. Hackers and cyber assassins present a constant threat to individuals, companies, and institutions. Protecting these targets requires a new kind of warrior, a cyber knight armed with the skills, weapons, and savvy needed to slay today’s dragons. One such digital warrior is Andy Webb, a former British Army officer. Together with Karen Spencer, a shy, twenty-something American who is a wizard when it comes to software, and Tommy Tyler, a rough and ready ex-soldier and hardware expert, Webb forms Century Consultants. The cyber security firm must work to defend its clients from the hackers, criminals and hired cyber assassins who seek out victims on the world wide web. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.




Rifts Coalition Wars


Book Description




Rifts Role-Playing Game


Book Description




Batman: Lost (2017-) #1


Book Description

Trapped in the Dark Multiverse, batman must face his greatest fears!




What Video Games Have to Teach Us About Learning and Literacy. Second Edition


Book Description

Cognitive Development in a Digital Age James Paul Gee begins his classic book with "I want to talk about video games–yes, even violent video games–and say some positive things about them." With this simple but explosive statement, one of America's most well-respected educators looks seriously at the good that can come from playing video games. This revised edition expands beyond mere gaming, introducing readers to fresh perspectives based on games like World of Warcraft and Half-Life 2. It delves deeper into cognitive development, discussing how video games can shape our understanding of the world. An undisputed must-read for those interested in the intersection of education, technology, and pop culture, What Video Games Have to Teach Us About Learning and Literacy challenges traditional norms, examines the educational potential of video games, and opens up a discussion on the far-reaching impacts of this ubiquitous aspect of modern life.




Future State: The Next Batman (2021-2021) #1


Book Description

Gotham City has always been dangerous-but now, it’s downright deadly! Following the tragedy of “A-Day,” the mayor allowed the private law enforcement group known as the Magistrate to take over policing so-called mask crime-and that has given rise to a new Dark Knight! What is this mysterious crime fighter’s connection to former Batman weaponeer Lucius Fox? The fight for justice has never been this dangerous! Then, in an new tale of the Outsiders, everything in Gotham City may be under the thumb of the Magistrate-but even members of that totalitarian force know that the outskirts of town are protected by the sword of Katana! Plus, ride with the Arkham Knights on their quest for freedom. Arkham Asylum has been decommissioned, and the Magistrate rules the land with an iron fist and zero tolerance. Now it’s time for the lunatics to take back their town! Follow Croc, Two-Face, Phosphorus, Zsasz, Clayface, and Astrid Arkham as the Arkham Knights raise holy hell on the occupiers of Gotham!




The Book of Monsters


Book Description

Introduces readers to the villains who threaten Knighton and the Nexo Knights who fight to stop them.




Rifts Coalition Wars


Book Description




Cybersecurity Issues in Emerging Technologies


Book Description

The threat landscape is evolving with tremendous speed. We are facing an extremely fast-growing attack surface with a diversity of attack vectors, a clear asymmetry between attackers and defenders, billions of connected IoT devices, mostly reactive detection and mitigation approaches, and finally big data challenges. The clear asymmetry of attacks and the enormous amount of data are additional arguments to make it necessary to rethink cybersecurity approaches in terms of reducing the attack surface, to make the attack surface dynamic, to automate the detection, risk assessment, and mitigation, and to investigate the prediction and prevention of attacks with the utilization of emerging technologies like blockchain, artificial intelligence and machine learning. This book contains eleven chapters dealing with different Cybersecurity Issues in Emerging Technologies. The issues that are discussed and analyzed include smart connected cars, unmanned ships, 5G/6G connectivity, blockchain, agile incident response, hardware assisted security, ransomware attacks, hybrid threats and cyber skills gap. Both theoretical analysis and experimental evaluation of state-of-the-art techniques are presented and discussed. Prospective readers can be benefitted in understanding the future implications of novel technologies and proposed security solutions and techniques. Graduate and postgraduate students, research scholars, academics, cybersecurity professionals, and business leaders will find this book useful, which is planned to enlighten both beginners and experienced readers.