Catalog Search Results
21) The Devil's Code
Author
Series
Kidd novels volume 3
Formats
Description
Before the chilling Prey novels, Sandford made his mark with computer genius Kidd. Now Kidd is back, but his colleague Jack Morrison is missing, and Kidd himself is being targeted in a national manhunt.
23) Burning blue
Author
Accelerated Reader
IL: UG - BL: 4.3 - AR Pts: 9
Description
When beautiful, smart Nicole, disfigured by acid thrown in her face, and computer hacker Jay meet in the school psychologist's office, they become friends and Jay resolves to find her attacker.
24) Sneakers
Pub. Date
2003.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
25) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
26) Find me
Author
Series
Pub. Date
[2013]
Accelerated Reader
IL: UG - BL: 4.2 - AR Pts: 9
Description
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.
28) Hacking
Author
Pub. Date
[2013]
Description
Discusses the threat hacking poses to computer security.
Author
Series
Accelerated Reader
IL: MG - BL: 7.4 - AR Pts: 1
Description
When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out...
Author
Pub. Date
2012
Description
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle...
Pub. Date
c2007
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the U.S. Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. As soon as John gets to Matt's apartment,...
Series
Dragon tattoo trilogy volume 1
Pub. Date
2009.
Formats
Description
Forty years after a woman vanishes from a gathering of a powerful and secretive family, a journalist and a computer hacker are asked to solve the mystery of her disappearance.
Author
Series
Sisterhood series volume 11
Pub. Date
c2008
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
Author
Pub. Date
2011
Description
So begins an evening unlike any other in Port Charles. When high- powered attorney Diane Miller agrees to meet with computer hacker extraordinaire Damian Spinelli, otherwise known as The Jackal, she knows she's in for an interesting night. But the stories he has to tell about some of Port Charles's most famous, and infamous, inhabitants are beyond her wildest imagination. Could these tales possibly be true? Or is Spinelli using her for some other...
38) Brain Jack
Author
Pub. Date
2010
Accelerated Reader
IL: MG+ - BL: 5.6 - AR Pts: 12
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
39) Brain Jack
Author
Pub. Date
c2009
Accelerated Reader
IL: MG+ - BL: 5.6 - AR Pts: 12
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
Author
Series
Find me volume 1
Pub. Date
2013.
Accelerated Reader
IL: UG - BL: 4.2 - AR Pts: 9
Description
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.