skip to content
Rules of engagement Preview this item
ClosePreview this item
Checking...

Rules of engagement

Author: David Bruns; J R Olson
Publisher: New York : St. Martin's Press, 2019.
Edition/Format:   Print book : Fiction : English : First editionView all editions and formats
Summary:
A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he's disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he's about to unleash his virtual masterpiece--a
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Thrillers (Fiction)
Fiction
War fiction
Suspense fiction
Material Type: Fiction
Document Type: Book
All Authors / Contributors: David Bruns; J R Olson
ISBN: 9781250200310 1250200318
OCLC Number: 1048939425
Description: x, 321 pages ; 25 cm
Responsibility: David Bruns and J. R. Olson.

Abstract:

A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1048939425<\/a>> # Rules of engagement<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1048939425<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Place\/united_states<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/midshipmen<\/a>> ; # Midshipmen<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Organization\/united_states_naval_academy_brigade_of_midshipmen<\/a>> ; # United States Naval Academy. Brigade of Midshipmen.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/terrorists<\/a>> ; # Terrorists<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/cyberterrorism<\/a>> ; # Cyberterrorism<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/artificial_intelligence<\/a>> ; # Artificial intelligence<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/midshipmen_united_states<\/a>> ; # Midshipmen--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/813.6\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/strategic_weapons_systems_computer_networks_security_measures<\/a>> ; # Strategic weapons systems--Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/computer_viruses<\/a>> ; # Computer viruses<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Person\/bruns_david_1966<\/a>> ; # David Bruns<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Person\/olson_j_r<\/a>> ; # J. R. Olson<\/span>\n\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"First edition.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2019<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"A terrorist breach of the computer systems of the three most powerful navies is about to set them on a collision course for World War III. Rafiq Roshed is one of the most wanted men in the world. A terrorist with a virulent grudge against the West, he\'s disappeared into North Korea where he quietly launches cyber sneak attacks in service of Kim Jong-un. But now he\'s about to unleash his virtual masterpiece--a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. First penetrating the Chinese, he has their war machine launch a series of attacks on the U.S. Pacific forces. Don Riley, head of U.S. Cyber Command, discovers that not only have the Chinese lost control of their military, but the same virus has infected the American network. It\'s only a matter of time before the U.S. loses control of its own military. His secret weapon in this war is a trio of supremely talented midshipman from the U.S. Naval Academy, who uncover the infilitration, and are working to track down the elusive terrorist. But time is running out. China and Japan have lost control of their military and the U.S. is in danger of doing the same. The weapons are hot and the result is an ever-larger real-world conflict where casualties continue to mount. The only remaining hope is to find and stop the attack at its source--before time runs out.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Rafiq Roshed, a terrorist with a virulent grudge against the West, disappeared into North Korea and now launches cyber sneak attacks in service of Kim Jong-un. His masterpiece: a computer virus that, once inserted into the command systems of a military, not only takes over, but also learns the art of war. Don Riley, head of U.S. Cyber Command, discovers that not only has Roshed gained control of the Chinese command systems, but the same virus has infected the American network. Time is running out, the weapons are hot and the only remaining hope is to find and stop the attack at its source-- before time runs out. -- adapted from jacket<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/5391916456<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Fiction<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Suspense fiction<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"War fiction<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Thrillers (Fiction)<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rules of engagement<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1048939425<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781250200310<\/a>> ;\u00A0\u00A0\u00A0\numbel:isLike<\/a> <http:\/\/bnb.data.bl.uk\/id\/resource\/GBB982988<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1048939425<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/813.6\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Organization\/united_states_naval_academy_brigade_of_midshipmen<\/a>> # United States Naval Academy. Brigade of Midshipmen.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Organization<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States Naval Academy. Brigade of Midshipmen.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States Naval Academy. Brigade of Midshipmen<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Person\/bruns_david_1966<\/a>> # David Bruns<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1966<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Bruns<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"David<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"David Bruns<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Person\/olson_j_r<\/a>> # J. R. Olson<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Olson<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"J. R.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"J. R. Olson<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Place\/united_states<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/artificial_intelligence<\/a>> # Artificial intelligence<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Artificial intelligence<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/computer_viruses<\/a>> # Computer viruses<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer viruses<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/cyberterrorism<\/a>> # Cyberterrorism<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberterrorism<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/midshipmen<\/a>> # Midshipmen<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Midshipmen<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/midshipmen_united_states<\/a>> # Midshipmen--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Midshipmen--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/strategic_weapons_systems_computer_networks_security_measures<\/a>> # Strategic weapons systems--Computer networks--Security measures<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Strategic weapons systems--Computer networks--Security measures<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/5391916456#Topic\/terrorists<\/a>> # Terrorists<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Terrorists<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781250200310<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1250200318<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781250200310<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n