Catalog Search Results
Author
Formats
Description
"Lisbeth Salander has been forged by a brutal childhood and horrific abuse. And repeated attempts on her life. The ink embedded in her skin is a constant reminder of her pledge to fight against the injustice she finds on every side. Confinement to the secure unit of a women's prison is intended as a punishment. Instead, Lisbeth finds herself in relative safety. Flodberga is a failing prison, effectively controlled by the inmates, and for a computer...
Author
Description
A 19-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions--without knowing the first thing about computers. A veteran cybersecurity specialist has built a deep network of top notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny New Jersey apartment...
Author
Formats
Description
The Girl is back. In this adrenaline-charged, up-to-the-moment political thriller, Stieg Larsson's Lisbeth Salander and Mikael Blomkvist, the troubled genius hacker and crusading journalist thrilled the world in The Girl with the Dragon Tattoo, The Girl Who Played with Fire, and The Girl Who Kicked the Hornet's Nest, are back. Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The...
7) Sneakers
Description
Robert Redford leads an all-star cast in one of the most satisfying suspense films! His team is routinely hired to test security systems. Bishop's (Redford) past comes back to haunt him when government agents blackmail the "sneakers" into carrying out a covert operation; tracking down the elusive black box. Bishop's team retrieves the box and makes a stunning discovery--the device can break into any computer system in the world. Also starts Sidney...
Author
Description
I am not the kind of mouse who spends money on useless things. But one day I kept getting packages of things I did not order or need. Someone on the Internet had stolen my identity! Professor Margo Bitmouse, a well-known computer expert, helped me track down the hacker. Could I find the thief before my reputation is was ruined?
Author
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
10) Tron: legacy
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
Author
Formats
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
12) Cruel intent
Author
Formats
Description
When her contractor's unfaithful wife is brutally murdered, former TV anchorwoman Ali Reynolds sets out to prove the husband's innocence in spite of skepticism on the part of Ali's detective boyfriend, a situation that catches the attention of the real killer.
13) The eye of minds
Author
Formats
Description
Michael is a gamer. And like most gamers, he almost spends more time on the VirtNet than in the actual world. The VirtNet offers total mind and body immersion, and it's addictive. Thanks to technology, anyone with enough money can experience fantasy worlds, risk their life without the chance of death, or just hang around with Virt-friends. And the more hacking skills you have, the more fun. Why bother following the rules when most of them are dumb,...
14) Cryptonomicon
Author
Formats
Description
More than fifty years after Lawrence Pritchard Waterhouse and Sergeant Bobby Shaftoe are assigned to Detachment 2702, a secret cryptographic mission, their grandchildren--Randy and Amy--join forces to create a "data haven" in the South Pacific, only to uncover a massive conspiracy with roots in Detachment 2702.
Author
Formats
Description
Mikael Blomkvist is publishing the story of his career, exposing the extensive sex trafficking operation between Sweden and Eastern Europe, but when two investigative journalists are killed the night before the story runs and Lisbeth Salander is implicated, Mikael vows to clear the girl's name and find the true killer.
Author
Description
Brigitte Sharp is a brilliant but haunted young MI6 hacker. When she decodes encrypted online messages, which she believes are connected to her best friend's murder, Bridge uncovers evidence of a mole inside a top secret Anglo-French military drone project. Forced back into the field by MI6, after three years desk-bound and in therapy, she discovers that the truth behind the Exphoria code is far worse than she could have imagined. Soon she's on the...
Author
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
18) Seconds to live
Author
Description
"When cybercriminals hack into the U.S. Marshal's Witness Protection database and auction off personal details to the highest bidder, FBI Agent Sean Nichols begins a high-stakes chase to find the hacker. Trouble is, he has to work with U.S. Marshal Taylor Mills, who knows the secrets of his past, and the seconds are ticking down before someone dies"--
Author
Appears on list
Description
The South Asian Province is split in two. Uplanders lead luxurious lives inside a climate-controlled biodome, dependent on technology and gene therapy to keep them healthy and youthful forever. Outside, the poor and forgotten scrape by with discarded black-market robotics, a society of poverty-stricken cyborgs struggling to survive in slums threatened by rising sea levels, unbreathable air, and deadly superbugs. Ashiva works for the Red Hand, an underground...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request