Catalog Search Results
1) Wired
Author
Series
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Pub. Date
2017.
Formats
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Author
Series
Lucy Kincaid thrillers volume 1
Description
"Six years ago, Lucy Kincaid was attacked and nearly killed by an online predator. She survived. Her attacker did not. Now Lucy's goal is to join the FBI and fight cyber-crime, but in the meantime, she's volunteering with a victim's rights group, surfing the Web undercover to lure sex offenders into the hands of the law. But when the predators she hunts start turning up as murder victims, the FBI takes a whole new interest in Lucy." -- p. [4] of cover....
4) Dark angel
Author
Series
Letty Davenport novels volume 2
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
5) Warcross
Author
Series
Warcross volume 1
Accelerated Reader
IL: UG - BL: 5.6 - AR Pts: 16
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
8) 1st case
Author
Formats
Description
Genius programmer Angela Hoot has always been at the top of her class. Now she's at the bottom of the FBI food chain -- until her first case threatens everyone around her.
Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge...
Author
Series
Formats
Description
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.
...Author
Series
Geronimo Stilton. Original series volume 68
Pub. Date
[2018]
Accelerated Reader
IL: MG - BL: 4.2 - AR Pts: 1
Description
I am not the kind of mouse who spends money on useless things. But one day I kept getting packages of things I did not order or need. Someone on the Internet had stolen my identity! Professor Margo Bitmouse, a well-known computer expert, helped me track down the hacker. Could I find the thief before my reputation is was ruined?
11) Ghost ship
Author
Series
NUMA files volume 12
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
12) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
13) Black widow
Author
Series
Doc Ford novels volume 15
Formats
Description
It went against all of Ford's instincts. When his goddaughter, Shay, called, he assumed it was with details of her imminent wedding, but the news was anything but cheerful. She and her bridesmaids had thrown a wild bachelorette party, it seemed, on St. Arc in the Windward Islands - and someone had secretly videotaped it. Now that person was threatening to blow up her future unless she came across with enough money. But don't worry, Doc, she said,...
Author
Series
Pub. Date
[2020]
Description
Using technology may come naturally to many young people, but that doesn't mean they're able to identify online risks. In this book, readers will learn how to spot and avoid hazards online. Being alert and aware helps Internet users protect their personal information, dodge scams, evaluate the credibility of websites, and safely connect with others. This simple guide to navigating the Internet with confidence provides tips and tricks for alert users....
15) Hacks: the inside story of the break-ins and breakdowns that put Donald Trump in the White House
Author
Pub. Date
2017.
Formats
Description
In June 2016, the Washington Post first reported that Russian hackers had penetrated the Democratic National Committee. Barely a month later, these cyber criminals -- which the U.S. government later confirmed as Russian intelligence operatives -- posted thousands of damaging emails online. These documents seemed to confirm Bernie Sanders supporters' belief that the DNC had become a tool of the Clinton campaign well before the convention. The hacking's...
16) Quantum
Author
Series
Captain Chase novels volume 1
Formats
Description
On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for a sabotage, with deadly consequences. As it turns out, the danger is worse than she thought. A spatter of dried blood, a missing security badge, a suspicious...
17) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
Formats
Description
The head of the U.S. National Underwater and Marine Agency’s (NUMA) Special Assignments Team unravels a new mystery in the dangers above and below the sea in the latest addition to the long-running series following Fast Ice.
A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe...