Catalog Search Results
1) Dark angel
Author
Series
Letty Davenport novels volume 2
Formats
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
2) Warcross
Author
Series
Warcross volume 1
Accelerated Reader
IL: UG - BL: 5.6 - AR Pts: 16
Formats
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
3) Wired
Author
Series
Formats
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
4) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
5) Hackers
Pub. Date
1998
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
Author
Pub. Date
2017.
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
7) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Pub. Date
[2021]
Description
"Max, a data whiz at the social media company Wren, has gotten a firsthand glimpse of the dark side of big tech. When he questions what his company does with the data they collect, he's fired...then black-balled across Silicon Valley. With time on his hands and revenge on his mind, Max and his longtime friend (and secretly the love of his life) Akiko, decide to get even by rebooting the internet. After all, in order to fix things, sometimes you have...
10) 1st case
Author
Formats
Description
Genius programmer Angela Hoot has always been at the top of her class. Now she's at the bottom of the FBI food chain -- until her first case threatens everyone around her.
Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge...
Author
Series
Lucy Kincaid thrillers volume 1
Pub. Date
[2010]
Description
"Six years ago, Lucy Kincaid was attacked and nearly killed by an online predator. She survived. Her attacker did not. Now Lucy's goal is to join the FBI and fight cyber-crime, but in the meantime, she's volunteering with a victim's rights group, surfing the Web undercover to lure sex offenders into the hands of the law. But when the predators she hunts start turning up as murder victims, the FBI takes a whole new interest in Lucy." -- p. [4] of cover....
Author
Description
"Award-winning investigative reporter Robert Kolker delivers a haunting and humanizing account of the true-life search for a serial killer still at large on Long Island, in a compelling tale of unsolved murder and Internet prostitution.One late spring evening in 2010, Shannan Gilbert, after running through the oceanfront community of Oak Beach screaming for her life, went missing. No one who had heard of her disappearance thought much about what had...
13) Quantum
Author
Series
Captain Chase novels volume 1
Formats
Description
On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for a sabotage, with deadly consequences. As it turns out, the danger is worse than she thought. A spatter of dried blood, a missing security badge, a suspicious...
14) Hacks: the inside story of the break-ins and breakdowns that put Donald Trump in the White House
Author
Pub. Date
2017.
Description
In June 2016, the Washington Post first reported that Russian hackers had penetrated the Democratic National Committee. Barely a month later, these cyber criminals -- which the U.S. government later confirmed as Russian intelligence operatives -- posted thousands of damaging emails online. These documents seemed to confirm Bernie Sanders supporters' belief that the DNC had become a tool of the Clinton campaign well before the convention. The hacking's...
15) Cyberbully
Pub. Date
[2012]
Description
Taylor Hillridge is a seventeen-year-old girl who falls victim to online bullying. Taylor receives a computer for her birthday and soon finds herself the victim of betrayal and bullying while on a social website. Afraid to face her peers at school (including her best friends), she is pushed to an extreme breaking point. Taylor's mom takes on the school system and state legislation to help others from going through similar ordeals.
16) Ghost ship
Author
Series
NUMA files volume 12
Formats
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
Pub. Date
[2016]
Description
Enter the "completely captivating" world of Mr. Robot. Cyber-security engineer by day and vigilante hacker by night, Elliot finds himself at a crossroads when the mysterious leader of an underground hacker group recruits him to destroy the firm he is paid to protect. Compelled by his personal beliefs, Elliot struggles to resist the chance to take down the multinational CEOs he believes are running (and ruining) the world.
19) Blackhat
Pub. Date
[2015]
Formats
Description
"A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta."
20) Snowden
Formats
Description
The incredible untold story of Edward Snowden, the polarizing figure who exposed shocking illegal surveillance activities by the NSA and became one of the most wanted men in the world. He is considered a hero by some, and a traitor by others.
"...a riveting procedural docudrama that takes a deep dive into what surveillance has become."--Variety.
"...numerous accomplished scenes..."--RogerEbert.com.
"It's sexy, controversial, visually interesting..."--New...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request