Catalog Search Results
1) Version zero
Author
Appears on list
Description
"Max, a data whiz at the social media company Wren, has gotten a firsthand glimpse of the dark side of big tech. When he questions what his company does with the data they collect, he's fired...then black-balled across Silicon Valley. With time on his hands and revenge on his mind, Max and his longtime friend (and secretly the love of his life) Akiko, decide to get even by rebooting the internet. After all, in order to fix things, sometimes you have...
Author
Formats
Description
"We live our lives - and conduct our business - online. To keep our data safe, we rely on passwords and encryption and private servers, IT departments and best practices. But there is a 70 perdent chance that your data is already compromised. Cybersecurity attacks have increased exponentially, but because they’re stealthy and often invisible, many underplay, ignore, or simply don’t realize the danger. By the time they discover a breach, most...
5) Trust
Description
When a young girl is assaulted by an older man she meets on the Internet, her family's bonds are ripped apart as her father searches across the country in an effort to track down her attacker and exact revenge.
6) Dark angel
Author
Series
Letty Davenport novels volume 2
Description
"Letty Davenport’s days working a desk job at are behind her. Her previous actions at a gunfight in Texas—and her incredible skills with firearms—draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant...
Author
Series
Lucy Kincaid thrillers volume 1
Description
"Six years ago, Lucy Kincaid was attacked and nearly killed by an online predator. She survived. Her attacker did not. Now Lucy's goal is to join the FBI and fight cyber-crime, but in the meantime, she's volunteering with a victim's rights group, surfing the Web undercover to lure sex offenders into the hands of the law. But when the predators she hunts start turning up as murder victims, the FBI takes a whole new interest in Lucy." --back cover.
8) Zero days
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
Author
Formats
Description
"Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black...
11) Wired
Author
Series
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Timesbestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Series
Amara Alvarez volume 2
Formats
Description
"Amara Alvarez's first case as a homicide detective drags her into the murky world of computer hackers. When she finds herself under attack by cybercriminals, she has no choice but to use unconventional methods to expose the truth and find a killer"--Provided by publisher.
Author
Formats
Description
Inexperienced users of computers often jump at the chance to click colorful flashing ads on the sidebar and are also tempted to download files from sites not worthy of trust. In short, people need to learn how to stay safe online. This book will introduce readers to different types of online threats, including viruses and malware. They will learn how different dangers spread and some basic steps to stop or prevent them. Additionally, this book will...
14) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--Provided by publisher.
15) Crash
Author
Formats
Description
When a small group of international business tycoons threaten to obliterate the world economy, only SEC computer expert Cindy David can stop them and teams up with a former Navy SEAL turned FBI employee to unravel the plot and save the economy from becoming the Second Great Depression.
16) Rule 34
Author
Series
Halting State volume 2
Description
Meet Edinburgh Detective Inspector Liz Kavanaugh, head of the Innovative Crimes Investigation Unit, otherwise known as the Rule 34 Squad. They monitor the Internet for potential criminal activity, analyzing trends in the extreme fringes of explicit content. And occasionally, even more disturbing patterns arise…
Three ex-cons have been murdered in Germany, Italy, and Scotland. The only things they had in common were arrests for spamming—and...
Three ex-cons have been murdered in Germany, Italy, and Scotland. The only things they had in common were arrests for spamming—and...
18) The fox
Author
Formats
Description
The #1 New York Times-bestselling master of international intrigue takes readers into the bleeding-edge world of technological espionage in a propulsive thriller that feels chillingly real.
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their...
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the Prime Minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their...
Author
Series
Geronimo Stilton. Original series volume 68
Formats
Description
When Geronimo discovers someone has stolen his identity, he enlists Professor Margo Bitmouse, a well-known computer expert, to help him track down the thief.
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Suggest a Purchase