Catalog Search Results
1) Wired
Author
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Formats
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Author
Description
"Six years ago, Lucy Kincaid was attacked and nearly killed by an online predator. She survived. Her attacker did not. Now Lucy's goal is to join the FBI and fight cyber-crime, but in the meantime, she's volunteering with a victim's rights group, surfing the Web undercover to lure sex offenders into the hands of the law. But when the predators she hunts start turning up as murder victims, the FBI takes a whole new interest in Lucy." -- p. [4] of cover....
4) Dark angel
Author
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
5) Warcross
Author
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
7) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
8) Wildcard
Author
Formats
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
9) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
10) 1st case
Author
Formats
Description
Genius programmer Angela Hoot has always been at the top of her class. Now she's at the bottom of the FBI food chain -- until her first case threatens everyone around her.
Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge...
Author
Formats
Description
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.
...Author
Description
Archos R-14. Nearly three years after this sophisticated artificial intelligence took over the world's computers and machines, ordinary people have waged an extraordinary guerrilla war and saved humankind from the brink of annihilation. But just moments after their triumph on the desolate ice fields of northern Alaska, a horrific new enemy emerges . . . in an unimaginable form. Fourteen-year-old Mathilda Perez attempts to save her brother's life while...
Author
Description
I am not the kind of mouse who spends money on useless things. But one day I kept getting packages of things I did not order or need. Someone on the Internet had stolen my identity! Professor Margo Bitmouse, a well-known computer expert, helped me track down the hacker. Could I find the thief before my reputation is was ruined?
Author
Description
Everyone is vulnerable to a cyber attack. Regardless of your age and station in life, one simple click of the mouse can open a Pandora's Box few of us could have imagined even five years ago. How we handle our online security is critical to protecting our personal and professional lives. But guidance for staying safe in the growing, interconnected world has been fragmented and confusing...until now. Hack-Proof Your Life Now! demystifies the topic...
15) Snowden
Formats
Description
The incredible untold story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world. He is considered a hero by some, and a traitor by others.
"...a riveting procedural docudrama that takes a deep dive into what surveillance has become."--Variety.
"...numerous accomplished scenes..."--RogerEbert.com.
"It's sexy, controversial, visually interesting..."--New...
16) Ghost ship
Author
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
17) Chat
Author
Description
"When a wintertime car accident leaves his mother and brother seriously injured, Joe Gunther takes a leave of absence to attend to them and investigate the cause of the crash"--Provided by publisher.
Author
Description
"Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. But when a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and protect her father's company. Diplomatic Security Service special...