Catalog Search Results
21) Burning blue
Author
Description
When beautiful, smart Nicole, disfigured by acid thrown in her face, and computer hacker Jay meet in the school psychologist's office, they become friends and Jay resolves to find her attacker.
22) Sneakers
Publisher
Universal
Pub. Date
2003.
Edition
Widescreen edition.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
23) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
24) Find me
Author
Series
Publisher
HarperTeen, an imprint of HarperCollinsPublishers
Pub. Date
[2013]
Edition
First edition.
Description
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.
26) Hacking
Author
Publisher
ReferencePoint Press
Pub. Date
[2013]
Description
Discusses the threat hacking poses to computer security.
Author
Series
Description
When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out...
Author
Publisher
OR Books
Pub. Date
2012
Description
Cypherpunks are activists who advocate the widespread use of strong cryptography (writing in code) as a route to progressive change. Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle...
Publisher
20th Century Fox Home Entertainment
Pub. Date
c2007
Edition
Widescreen ed. ; Unrated.
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the U.S. Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. As soon as John gets to Matt's apartment,...
Series
Dragon tattoo trilogy volume 1
Pub. Date
2009.
Formats
Description
Forty years after a woman vanishes from a gathering of a powerful and secretive family, a journalist and a computer hacker are asked to solve the mystery of her disappearance.
32) We are Anonymous: inside the hacker world of Lulzsec, Anonymous, and the global cyber insurgency
Author
Publisher
Back Bay Books
Pub. Date
2013
Edition
First Back Bay paperback edition.
Author
Series
Sisterhood series volume 11
Publisher
Kensington
Pub. Date
c2008
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
Author
Publisher
Hyperion
Pub. Date
2011
Edition
1st ed.
Description
So begins an evening unlike any other in Port Charles. When high- powered attorney Diane Miller agrees to meet with computer hacker extraordinaire Damian Spinelli, otherwise known as The Jackal, she knows she's in for an interesting night. But the stories he has to tell about some of Port Charles's most famous, and infamous, inhabitants are beyond her wildest imagination. Could these tales possibly be true? Or is Spinelli using her for some other...
Author
Publisher
DK
Pub. Date
2002
Description
This guide to codebreakers covers every type of code from hieroglyphs to hackers. It is designed to appeal to reluctant readers with "weird world" feature boxes, dramatic photographs, close-up views, lots of quirky facts and figures, and a mega reference section.
36) Brain Jack
Author
Publisher
Random House
Pub. Date
c2009
Edition
1st American ed.
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
37) Brain Jack
Author
Publisher
Random House
Pub. Date
2010
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
Author
Series
Find me volume 1
Publisher
HarperTeen, an imprint of HarperCollinsPublishers
Pub. Date
2013.
Edition
First edition.
Description
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.
39) WWW: Wonder
Author
Series
WWW trilogy volume 3
Publisher
Ace Books
Pub. Date
[2011]
Edition
First edition.
Description
Caitlin Decter, a formerly blind sixteen-year-old math genius, desperately wants to protect her friend, Webmind--the consciousness that sprang from the infrastructure of the World Wide Web--but the Pentagon views him as a threat.
Publisher
Warner Home Video
Pub. Date
c2008
Description
Contains four films about a computer hacker who realizes the world is an elaborate deception created by all-powerful machines of artifical intelligence. In Matrix, in an anti-utopian future, the "real" world is a computer construct, created by an all-powerful artificial intelligence. A small group of humans has found a way out of the construct and is now fighting for the future of the human race. In Matrix reloaded, Neo, Trinity, and Morpheus continue...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request