Catalog Search Results
Description
Brilliant renegade hacker Mike Cleary and his crack team have finally debugged Guradian, his software program designed to block government cyber snooping, it's going to make them all rich. But as he and his team are targeted and the body count climbs, Cleary discovers that he is at the center of a web of deceit aimed at gaining control of his program at any cost.
Author
Series
Millennium novels (Stieg Larsson) volume 2
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
Author
Series
Description
#1 NATIONAL BESTSELLER • Lisbeth Salander and Mikael Blomkvist return to the Girl in the Dragon Tattoo series in this ripped-from-the-headlines, high-octane follow-up to Stieg Larsson's The Girl Who Kicked the Hornet's Nest. • Also known as the Millennium series
“Rest easy, Lisbeth Salander fans—our punk hacker heroine is in good hands.… A twisty, bloody thrill ride.… An instant page-turner.”...
“Rest easy, Lisbeth Salander fans—our punk hacker heroine is in good hands.… A twisty, bloody thrill ride.… An instant page-turner.”...
Author
Appears on list
Formats
Description
“[A] Harry Potter-ish action-adventure romance” set during the Arab Spring, from the New York Times–bestselling author of the Ms. Marvel comic book series (The New York Times).
In an unnamed Middle Eastern security state, a young Arab-Indian hacker, who goes by Alif, shields his clients—dissidents, outlaws, revolutionaries, and other watched groups—from surveillance, and tries to...
In an unnamed Middle Eastern security state, a young Arab-Indian hacker, who goes by Alif, shields his clients—dissidents, outlaws, revolutionaries, and other watched groups—from surveillance, and tries to...
Author
Series
Dewey Andreas thrillers volume 5
Description
"Dewey Andreas, former Delta and newly recruited intelligence agent, is sidelined after screwing up his last two operations. Still drowning in grief after the tragic murder of his fiance, Dewey has seemingly lost his focus, his edge, and the confidence of his superiors. A high level Russian hacker, known only as Cloud, is believed to be routing large amounts of money to various Al Qaeda terror cells, and the mission is to capture and render harmless...
Description
Follows a team of thieves, hackers, and con artists who act as modern-day Robin Hoods, standing up for the little guy who has been victimized by the rich and powerful. The team takes on corrupt bankers, high fashion, the tabloid media, and, most shockingly, an old nemesis from their past.
Author
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect—her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer"...
9) Antisocial
Author
Description
"One by one, students' phones are hacked at Alexandria Prep. What was thought to be a joke escalates quickly as private information and secrets are revealed, leaving everyone exposed, and Anna Soler on the the hunt for the hacker"--Provided by publisher.
Author
Series
Millennium novels (Stieg Larsson) volume 5
Description
Accepting help from investigative journalist Mikael Blomkvist to uncover the truth about her traumatic childhood, Lisbeth Salander, the girl with the dragon tattoo, navigates dangerous obstacles in the form of an anti-Muslim gang, her mafia-connected twin and the conductors of a sinister pseudoscientific experiment.
11) Deadlock
Author
Series
Hacker world volume 1
Formats
Description
Discover New York Times bestselling author Cherrie Lynn's Deadlock, featuring a team of elite military hackers who will do whatever it takes to protect their country and the women who enter their dark and dangerous world.
Ex-Air Force hacker Jace Adams is the best at what he does. There isn't a system he can't infiltrate or a country his team can't topple. But when he finds Lena Morris, the woman he hates most in the world, on his doorstep, the last...
Description
In 2029 a female cybernetic government agent and the Internal Bureau of Investigations are hot on the trail of "The Puppet Master", a mysterious and threatening computer virus capable of infiltrating human hosts. Together, with her fellow agents from Section 9, they embark on a high-tech race against time to capture the omnipresent entity.
14) City of the dead
Author
Series
City spies volume 4
Formats
Description
When hackers target locations all over London, Kat leads the City Spies in testing security for the British Museum where a secret message leads them to Egypt and the ancient City of the Dead.
15) Attack surface
Author
Series
Formats
Description
Working for a transnational cybersecurity firm while secretly helping high-paying troublemakers evade detection, a counterterrorism hacker is forced to acknowledge the consequences of her actions when one of her hacks puts loved ones in danger.
Author
Series
Oregon files volume 11
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
Author
Description
"A hack is any means of subverting a system’s rules in unintended ways. The tax code isn’t computer code, but a series of complex formulas. It has vulnerabilities; we call them 'loopholes.' We call exploits 'tax avoidance strategies.' And there is an entire industry of 'black hat' hackers intent on finding exploitable loopholes in the tax code. We call them accountants and tax attorneys. In A Hacker’s Mind, Bruce Schneier takes hacking out of...
18) The zero theorem
Description
The story about a computer hacker in a dystopian sci-fi world. Living under constant surveillance by 'Management,' he strives to solve The Zero Theorem, a mathematical formula that may hold the key to the meaning of life.
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Suggest a Purchase