Catalog Search Results
21) Alif the unseen
Author
Formats
Description
In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients, dissidents, outlaws, Islamists, and other watched groups, from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the State's electronic...
22) The empress file
Author
Series
Kidd novels volume 2
Formats
Description
From the #1 New York Times With the same sharp human insight he brings to the murderers and manhunters of his bestselling Prey novels, Sanford takes us into the minds of two irresistible con artists. Kidd and LuEllen are a winning pair of lovers and liars plotting the ultimate sting. Their target is the wealthy (and corrupt) mayor of a small Mississippi river town. Their setup includes buying a houseboat, assuming false identities, and exposing local...
Author
Series
Adventures in extreme reading volume 1
Pub. Date
[2013]
Accelerated Reader
IL: MG - BL: 4.4 - AR Pts: 2
Description
Carter Lewis's Uncle Dan has invented a suit that creates a virtual reality world so that the person experiences and interacts with a book as if he were actually there--but when Carter and his cousin Isabelle put on the suits they discover that a hacker is playing games with them.
24) Sneakers
Pub. Date
2003.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
25) Don't look now
Author
Series
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 13
Description
Noa continues her efforts to protect runaways from the illicit experiments being conducted by a sinister corporation, while hacker Peter struggles to support her and work against the company on behalf of his victimized girlfriend.
27) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
28) Streams of Babel
Author
Series
Pub. Date
[2008]
Accelerated Reader
IL: UG - BL: 5.8 - AR Pts: 17
Description
Six teens face a bioterrorist attack on American soil as four are infected with a mysterious disease affecting their small New Jersey neighborhood and two others, both brilliant computer hackers, assist the United States Intelligence Coalition in tracking the perpetrators.
29) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
Author
Series
Sam Capra novels volume 2
Pub. Date
2012
Description
Sam Capra has one reason to live: to rescue his baby son from the people who abducted him. An ex-CIA agent, Sam now owns bars around the world as cover for his real mission - working for a secret network as mysterious as it is powerful, while using his skills to find his child. But the kidnappers have offered a deadly deal: they'll surrender Sam's child if Sam finds and assassinates the one man who can expose them. Teaming up with a desperate young...
32) Burning blue
Author
Accelerated Reader
IL: UG - BL: 4.3 - AR Pts: 9
Description
When beautiful, smart Nicole, disfigured by acid thrown in her face, and computer hacker Jay meet in the school psychologist's office, they become friends and Jay resolves to find her attacker.
33) Code hunter
Pub. Date
2002
Description
America's best player is being pulled in the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's most wanted list, and is blackmailing him to take part in a real twisted plan of world destruction.
34) Tron: legacy
Series
Pub. Date
2011
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
Series
Dragon tattoo trilogy volume 1
Pub. Date
2009.
Formats
Description
Forty years after a woman vanishes from a gathering of a powerful and secretive family, a journalist and a computer hacker are asked to solve the mystery of her disappearance.
36) Find me
Author
Series
Pub. Date
[2013]
Accelerated Reader
IL: UG - BL: 4.2 - AR Pts: 9
Description
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.
Pub. Date
2004, c1995
Description
In 2029 a female cybernetic government agent and the Internal Bureau of Investigations are hot on the trail of "The Puppet Master," a mysterious and threatening computer virus capable of infiltrating human hosts. Together with her fellow agents from Section 9 they embark on a high-tech race against time to capture the omnipresent entity.
40) Hacking
Author
Pub. Date
[2013]
Description
Discusses the threat hacking poses to computer security.