Catalog Search Results
Author
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
Author
Description
Written by American author and dedicated abolitionist Harriet Beecher Stowe, "Uncle Toms Cabin" is a poignant novel which shows the harsh reality of a slaves life in the 1800s. Uncle Tom, an African-American slave who believes in the power of Christian faith. The book would be a major contributor to the Civil War because its compelling portrayal of slaves as fellow human beings left little room for compromise: if slaves were indeed...
6) Dark angel
Author
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
Author
Description
"Vivian Miller is a dedicated CIA counterintelligence analyst assigned to uncover the leaders of Russian sleeper cells in the United States. On track for a much-needed promotion, she's developed a system for identifying Russian agents, seemingly normal people living in plain sight. After accessing the computer of a potential Russian operative, Vivian stumbles on a secret dossier of deep-cover agents within America's borders. A few clicks later, everything...
Author
Appears on these lists
Description
Gone with the Wind by Margaret Mitchell is a classic novel that has captured the hearts of readers for generations. Set in the American South during the Civil War and Reconstruction eras, the story follows the life of Scarlett O'Hara, a headstrong and determined young woman who is forced to navigate the challenges of war, love, and loss. Throughout the novel, Scarlett's character undergoes significant growth and transformation as she learns to adapt...
10) The great Gatsby
Author
Appears on list
Description
A must-have new edition of one of the great American novels--and one of America's most popular--featuring a new introduction by Min Jin Lee, the New York Times bestselling author of Pachinko, and a striking new cover that brings the quintessential novel of the Roaring Twenties into the 2020s. Young, handsome, and fabulously rich, Jay Gatsby seems to have everything. But at his mansion east of New York City, in West Egg, Long Island, where the party...
11) Wired
Author
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
14) 1st case
Author
Formats
Description
Genius programmer Angela Hoot has always been at the top of her class. Now she's at the bottom of the FBI food chain -- until her first case threatens everyone around her.
Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge...
15) Little Brother
Author
Formats
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
Author
Description
"After a CIA covert mission goes badly awry, U.S. Air Force intelligence officer Nicholas Flynn is exiled to guard a remote radar post along Alaska's Arctic frontier. This dead-end assignment is designed to put his career permanently on ice, but Flynn's not the type to fade quietly into obscurity... As winter storms pound Alaska and northern Canada, Russian aircraft begin penetrating deep into friendly airspace. Are these rehearsals for a possible...
Author
Description
Irene Steele's idyllic life--house, husband, family--is shattered when she is woken up by a late-night phone call. Her beloved husband has been found dead, but before Irene can process this tragic news, she must confront the perplexing details of her husband's death. He was found on St. John island, a tropical paradise far removed from their suburban life. Leaving the cold winter behind, Irene flies down to the beautiful Caribbean beaches of St. John...
19) Long shadows
Author
Description
When Amos Decker is called to South Florida to investigate a double homicide, the case appears straightforward: A federal judge and her bodyguard have been found dead, the judge's face sporting a blindfold with two eye holes crudely cut out, a clear sign that she'd made one too many enemies over her years on the bench. What at first seems cut and dry is anything but: Not only did the judge have more enemies than Decker can count--from violent gang...
20) The Eye of Minds
Author
Description
"Michael is a skilled internet gamer in a world of advanced technology. When a cyber-terrorist begins to threaten players, Michael is called upon to seek him and his secret's out"--