Catalog Search Results
1) 1st case
Author
Formats
Description
Genius programmer Angela Hoot has always been at the top of her class. Now she's at the bottom of the FBI food chain -- until her first case threatens everyone around her.
Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge...
Author
Series
Men of the sisterhood volume 2
Description
"With the women of the Sisterhood away on a covert assignment, their significant others could be expected to kick back and enjoy a little drama-free downtime. But that's not the way Jack, Ted, Harry, Charles, and the rest of their comrades roll. An urgent call has come to the headquarters of their organization, BOLO Consultants. Bert Navarro, head of security for Countess Anna de Silva, suspects that Annie's deluxe casino, Babylon, is being stealthily...
3) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Formats
Description
Maybe you don't know your neighbors as well as you thought you did . . .
"This is a very difficult letter to write. I hope you will not hate us too much. . . My son broke into your home recently while you were out."
In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well--learning their secrets, and maybe sharing some of them, too.
Who is he, and what might he have uncovered?...
Author
Pub. Date
2022.
Accelerated Reader
IL: UG - BL: 4.8 - AR Pts: 14
Appears on list
Description
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
Author
Pub. Date
[2023]
Description
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our...
Author
Series
Pike Logan thrillers volume 17
Formats
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
Author
Pub. Date
2018.
Description
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away.
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate...
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars"produce real-world casualties, and viral misinformation alters not just the result of battles, but the very fate...
Author
Pub. Date
2018.
Description
Ten months ago Allie Harper --smart, feisty, too broke to get her car fixed-- rescued Thomas Bennington III, a hot, blind, college professor from a crosswalk in her dicey Cleveland neighborhood. When Allie saved Tom and his groceries from traffic, she unwittingly retrieved his winning $550 million Mondo Mega Jackpot ticket. The payout steered the two of them into a wild dash from romance to mayhem and multiple murders. Nothing's changed. Sure,...
Author
Pub. Date
2016.
Accelerated Reader
IL: MG+ - BL: 5.1 - AR Pts: 10
Description
Sammy Wallach's plans for the end of her junior year include sneaking out to the city to see her favorite band and getting Jamie Moss to ask her to the faux prom, but when the international bank her father works for is hacked she suddenly finds her and her family's whole digital world, emails, photos, journal, exposed for everyone to see--and the repercussions are making all their lives a misery.
Author
Series
Tom Clancy's Net Force (Adult series) volume 11
Pub. Date
[2019]
Description
The number one threat to the nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven, and officially unnamed, Net Force's elite group of...
14) Genius: the con
Author
Series
Genius (Leopoldo Gout) volume 2
Pub. Date
2017.
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 11
Description
Three young geniuses from around the globe hatch a plot to trick a vicious warlord, infiltrate a mastermind's organization, protect their families, and save the world.
15) Attack surface
Author
Series
Pub. Date
2020.
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counter-terrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
16) Black Hat Python
Author
Pub. Date
2021.
Description
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. In Black Hat Python , 2nd Edition, you’ll explore the darker side of Python’s capabilities—writing network sniffers, stealing email credentials, brute forcing directories, crafting mutation fuzzers, infecting virtual machines, creating stealthy trojans, and more. The second edition of this bestselling hacking book contains...
18) Chaos on CatNet
Author
Series
Catnet volume 2
Pub. Date
2021.
Description
Steph and her mom settle in Minneapolis where Steph befriends Nell, whose mother and girlfriend are missing, and together with the help of CheshireCat they work to find Nell's missing loved ones and end up uncovering a nefarious AI hacking into social networks and chats to instigate paranoia and violence in the real world.
19) The Mueller report: the final report of the Special Counsel into Donald Trump, Russia, and collusion
Author
Pub. Date
[2019]
Description
"There has never been a more important political investigation than Robert S. Mueller III's into President Donald Trump's possible collusion with Russia. His momentous findings can be found here, complete with: -- The 300+ pages of the historic report -- An introduction by constitutional scholar, eminent civil libertarian, and New York Times bestselling author Alan Dershowitz. -- The relevant portions of Title 28 of the Code of Federal Regulations,...