Catalog Search Results
Author
Series
Summary
"The dazzling new novel in the #1 New York Times-bestselling series from Clive Cussler, the grand master of adventure. When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown, or was the yacht abandoned when he came aboard? For reasons he cannot explain, Kurt doesn't trust either version of his recollection. Determined...
3) Breakneck
Author
Summary
Pursuing a string of senseless murders of clean-cut young adults, detectives M.C. Riggio and Kitt Lundgren find the investigation shattered by M.C.'s fiance's murder, which strains M.C.'s relationship with Kitt and brings the fiancé's true nature into question.
4) Wildcard
Author
Series
Warcross volume 2
Lexile Measure
810L
Summary
Emika Chen barely made it out of the Warcross Championships alive. Now that she knows the truth behind Hideo's new NeuroLink algorithm, she can no longer trust the one person she's always looked up to, who she once thought was on her side. Determined to put a stop to Hideo's grim plans, Emika and the Phoenix Riders band together, only to find a new threat lurking on the neon-lit streets of Tokyo. Someone's put a bounty on Emika's head, and her sole...
5) The fox
Author
Summary
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
Lucy Kincaid volume 1
Summary
"Six years ago, Lucy Kincaid was attacked and nearly killed by an online predator. She survived. Her attacker did not. Now Lucy's goal is to join the FBI and fight cyber-crime, but in the meantime, she's volunteering with a victim's rights group, surfing the Web undercover to lure sex offenders into the hands of the law. But when the predators she hunts start turning up as murder victims, the FBI takes a whole new interest in Lucy." -- p. [4] of cover....
8) Dark angel
Author
Series
Letty Davenport volume 2
Summary
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more...
Author
Series
Geronimo Stilton volume 68
Lexile Measure
590L
Formats
Summary
I am not the kind of mouse who spends money on useless things. But one day I kept getting packages of things I did not order or need. Someone on the Internet had stolen my identity! Professor Margo Bitmouse, a well-known computer expert, helped me track down the hacker. Could I find the thief before my reputation is was ruined?
11) Wired
Author
Series
Summary
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Pub. Date
[2015]
Summary
In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology...
Author
Pub. Date
[2022]
Summary
"A propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, taking once-anonymous realms of money, drugs, and violence and holding them up to the light Black markets have always thrived in the shadows of society. Increasingly, these enterprises-drug dealing, money laundering, human trafficking, terrorist funding-have found their shadows online. Digital crime lords inhabiting lawless corners of the internet have operated...
Author
Formats
Summary
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
17) 1st case
Author
Summary
"Recruited into the FBI when her unorthodox programming skills get her kicked out of MIT, a computer genius tracks a killer who has been targeting young women through a sophisticated messaging app."--
Author
Pub. Date
c2012
Summary
An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg.
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing...
Author
Pub. Date
2016.
Summary
Reveals the history of espionage and its use of and dependency on technology, beginning with the Second World War and continuing through the Cold War and into the present Internet age where hackers and surveillance are commonplace.
The intertwining forces of computers and espionage are reshaping the entire world: what was once the preserve of a few intelligence agencies now affects us all. BBC security correspondent Gordon Corera's narrative takes...