WorldCat Identities

Singer, Bryan

Overview
Works: 6 works in 11 publications in 1 language and 603 library holdings
Genres: Drama  Science fiction films  Action and adventure films  Thrillers (Motion pictures)  Detective and mystery films  Film adaptations  Superhero films  Film noir  Juvenile works  Animated television programs 
Roles: Author
Classifications: PN1997.2, 791.4372
Publication Timeline
.
Most widely held works by Bryan Singer
Superman returns : the prequels by Bryan Singer( Book )

4 editions published in 2006 in English and held by 261 WorldCat member libraries worldwide

Collects the prequel stories that explore the five year gap between Superman's departure from Earth and his return as depicted in Superman Returns
X-Men, days of future past by Bryan Singer( Visual )

3 editions published between 2000 and 2009 in English and held by 130 WorldCat member libraries worldwide

X-men takes place in the near future, as certain humans are evolving into mutants with special powers. In the Canadian wilderness, a young runaway mutant named Rogue (Anna Paquin) and Wolverine (Hugh Jackman), a bad-tempered, quick-healing mutant with retractable metal claws, are suddenly attacked by the powerful Magneto (Ian McKellen) and his lackeys. Fortunately, Cyclops (James Marsden) and Storm (Halle Berry), students of the compassionate Professor Charles Xavier (Patrick Stewart), interfere and bring them back to Xavier's School for Gifted Youngsters. Here Wolverine and Rogue learn more about the conflict between Xavier and the militant Magneto, who wants to power a device that will genetically alter humans, with possibly deadly results. Only Xavier's students can stop Magneto's plans
Trick 'r treat : tales of mayhem, mystery & mischief by John Griffin( Book )

1 edition published in 2007 in English and held by 13 WorldCat member libraries worldwide

The usual suspects by Bryan Singer( Visual )

1 edition published in 1996 in English and held by 12 WorldCat member libraries worldwide

When bodies are found floating in Long Beach Harbor, U.S. Customs agent Daniel Kujan investigates the crime and the identity of the dreaded killer--Keyser Söze--said to be behind it
X-men trilogy( Visual )

1 edition published in 2009 in English and held by 7 WorldCat member libraries worldwide

As the public becomes aware of genetic mutants with special powers and prejudice grow against them, Professor Xavier brings them together to harness their powers for the good of mankind and to combat the evil Magneto; When a military leader hatches a plan to eradicate mutants, the X-men form an alliance with their old enemy Magneto to try and stop him; When science announces a cure for mutant powers, Magneto his Brotherhood of Evil Mutants resist the idea that they need to be cured, and try to destroy the human race
Cybersecurity for industrial control systems : SCADA, DCS, PLC, HMI, and SIS by Tyson Macaulay( )

1 edition published in 2012 in English and held by 0 WorldCat member libraries worldwide

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency. Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS. Highlighting the key issues that need to be addressed, the book begins with a thorough introduction to ICS. It discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. Next, it explains why security requirements differ from IT to ICS. It differentiates when standard IT security solutions can be used and where SCADA-specific practices are required. The book examines the plethora of potential threats to ICS, including hi-jacking malware, botnets, spam engines, and porn dialers. It outlines the range of vulnerabilities inherent in the ICS quest for efficiency and functionality that necessitates risk behavior such as remote access and control of critical equipment. Reviewing risk assessment techniques and the evolving risk assessment process, the text concludes by examining what is on the horizon for ICS security, including IPv6, ICSv6 test lab designs, and IPv6 and ICS sensors
 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.19 (from 0.13 for X-Men, day ... to 0.56 for Trick 'r t ...)

Superman returns : the prequels
Languages
English (11)

Covers
Trick 'r treat : tales of mayhem, mystery & mischief