Catalog Search Results
Author
Formats
Description
"Lisbeth Salander has been forged by a brutal childhood and horrific abuse. And repeated attempts on her life. The ink embedded in her skin is a constant reminder of her pledge to fight against the injustice she finds on every side. Confinement to the secure unit of a women's prison is intended as a punishment. Instead, Lisbeth finds herself in relative safety. Flodberga is a failing prison, effectively controlled by the inmates, and for a computer...
Author
Description
A 19-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions--without knowing the first thing about computers. A veteran cybersecurity specialist has built a deep network of top notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny New Jersey apartment...
Author
Formats
Description
The Girl is back. In this adrenaline-charged, up-to-the-moment political thriller, Stieg Larsson's Lisbeth Salander and Mikael Blomkvist, the troubled genius hacker and crusading journalist thrilled the world in The Girl with the Dragon Tattoo, The Girl Who Played with Fire, and The Girl Who Kicked the Hornet's Nest, are back. Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The...
Author
Description
I am not the kind of mouse who spends money on useless things. But one day I kept getting packages of things I did not order or need. Someone on the Internet had stolen my identity! Professor Margo Bitmouse, a well-known computer expert, helped me track down the hacker. Could I find the thief before my reputation is was ruined?
Author
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
9) Tron: legacy
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
Author
Formats
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
11) Cruel intent
Author
Formats
Description
When her contractor's unfaithful wife is brutally murdered, former TV anchorwoman Ali Reynolds sets out to prove the husband's innocence in spite of skepticism on the part of Ali's detective boyfriend, a situation that catches the attention of the real killer.
12) Cryptonomicon
Author
Formats
Description
More than fifty years after Lawrence Pritchard Waterhouse and Sergeant Bobby Shaftoe are assigned to Detachment 2702, a secret cryptographic mission, their grandchildren--Randy and Amy--join forces to create a "data haven" in the South Pacific, only to uncover a massive conspiracy with roots in Detachment 2702.
Author
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
14) This mortal coil
Author
Formats
Description
"In a world where people are implanted with technology to recode their DNA, gene-hacking genius Cat must decrypt her late father's message concealing a vaccine to a horrifying plague"--
Author
Formats
Description
Mikael Blomkvist is publishing the story of his career, exposing the extensive sex trafficking operation between Sweden and Eastern Europe, but when two investigative journalists are killed the night before the story runs and Lisbeth Salander is implicated, Mikael vows to clear the girl's name and find the true killer.
Author
Description
Brigitte Sharp is a brilliant but haunted young MI6 hacker. When she decodes encrypted online messages, which she believes are connected to her best friend's murder, Bridge uncovers evidence of a mole inside a top secret Anglo-French military drone project. Forced back into the field by MI6, after three years desk-bound and in therapy, she discovers that the truth behind the Exphoria code is far worse than she could have imagined. Soon she's on the...
17) Seconds to live
Author
Description
"When cybercriminals hack into the U.S. Marshal's Witness Protection database and auction off personal details to the highest bidder, FBI Agent Sean Nichols begins a high-stakes chase to find the hacker. Trouble is, he has to work with U.S. Marshal Taylor Mills, who knows the secrets of his past, and the seconds are ticking down before someone dies"--
Author
Appears on list
Description
The South Asian Province is split in two. Uplanders lead luxurious lives inside a climate-controlled biodome, dependent on technology and gene therapy to keep them healthy and youthful forever. Outside, the poor and forgotten scrape by with discarded black-market robotics, a society of poverty-stricken cyborgs struggling to survive in slums threatened by rising sea levels, unbreathable air, and deadly superbugs. Ashiva works for the Red Hand, an underground...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request