Catalog Search Results
Author
Series
Millennium novels (Stieg Larsson) volume 2
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
Author
Description
"In the concluding volume of Stieg Larsson's Millenium trilogy, Lisbeth Salander lies in critical condition in a Swedish hospital, a bullet in her head. But she's fighting for her life in more ways than one: if and when she recovers, she'll stand trial for three murders. With the help of Mikael Blomkvist, she'll need to identify those in authority who have allowed the vulnerable, like herself, to suffer abuse and violence. And, on her own, she'll...
Author
Series
Millennium novels (Stieg Larsson) volume 1
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
Author
Series
Formats
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
7) Ghost ship
Author
Series
NUMA files volume 12
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
10) Neuromancer
Author
Series
Appears on these lists
Formats
Description
The Matrix unfolds like neon origami beneath clusters and constellations of data. Constructs, AIs, live here. Somewhere, concealed by ice, Neuromancer is evolving. As entropy goes into reverse, Molly's surgical implants broadcast trouble from the ferro-concrete geodesic of the Sprawl. Maelcum, Rastafarian in space, is her best hope of rescue. But she and Case, computer cowboy, are busy stealing data from the almighty Megacorps. If the Megacorps do...
11) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
Sisterhood series volume 11
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
13) The Devil's Code
Author
Series
Kidd novels volume 3
Formats
Description
Before the chilling Prey novels, Sandford made his mark with computer genius Kidd. Now Kidd is back, but his colleague Jack Morrison is missing, and Kidd himself is being targeted in a national manhunt.
14) The empress file
Author
Series
Kidd novels volume 2
Formats
Description
From the #1 New York Times With the same sharp human insight he brings to the murderers and manhunters of his bestselling Prey novels, Sanford takes us into the minds of two irresistible con artists. Kidd and LuEllen are a winning pair of lovers and liars plotting the ultimate sting. Their target is the wealthy (and corrupt) mayor of a small Mississippi river town. Their setup includes buying a houseboat, assuming false identities, and exposing local...
15) Alif the unseen
Author
Formats
Description
In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients, dissidents, outlaws, Islamists, and other watched groups, from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the State's electronic...
Author
Series
Outlaw chronicles volume 3
Description
Seventeen-year-old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world's largest corporations. But when the biggest job of her life goes wrong, she's plunged into a desperate situation with only one way out: one last hack that will either save her or kill her.
17) Tron : legacy
Series
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
Author
Series
Kidd novels volume 4
Formats
Description
Kidd's friend, Bobby the superhacker, has been murdered. When Kidd goes to Bobby's house to investigate, he finds his battered body, but not his jazzed-up laptop. Now Kidd is doubly disturbed. The murderer is still at large and now has enough secret information to hang a whole lot of people, including Kidd himself. Dodging both the law and other computerheads who want Bobby's information, kidd has to move fast if he is going to survive.
Author
Series
Adventures in extreme reading volume 1
Pub. Date
[2013]
Description
Carter Lewis's Uncle Dan has invented a suit that creates a virtual reality world so that the person experiences and interacts with a book as if he were actually there--but when Carter and his cousin Isabelle put on the suits they discover that a hacker is playing games with them.
20) Sneakers
Pub. Date
2003.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.