Catalog Search Results
Author
Pub. Date
2015
Physical Desc
1 online resource (xxix, 625 pages : illustrations)
Language
English
Description
An introduction to the art of ethical hacking for professionals and security analysts addresses a range of moral and legal issues regarding hacking, offers detailed instructions, countermeasures, and moral disclosure procedures.
Author
Series
Millennium novels (Stieg Larsson) volume 4
Language
English
Description
The Girl is back. In this adrenaline-charged, up-to-the-moment political thriller, Stieg Larsson's Lisbeth Salander and Mikael Blomkvist, the troubled genius hacker and crusading journalist thrilled the world in The Girl with the Dragon Tattoo, The Girl Who Played with Fire, and The Girl Who Kicked the Hornet's Nest, are back. Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The...
Author
Series
Millennium novels (Stieg Larsson) volume 2
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 30
Language
English
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
4) The fox
Author
Language
English
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
City spies volume 4
Accelerated Reader
IL: MG - BL: 5.6 - AR Pts: 10
Language
English
Description
When hackers target locations all over London, Kat leads the City Spies in testing security for the British Museum where a secret message leads them to Egypt and the ancient City of the Dead.
Publisher
Kanopy Streaming
Pub. Date
2014.
Physical Desc
1 online resource (1 video file, approximately 36 min.) : digital, .flv file, sound
Language
English
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Series
Language
English
Description
“Hard-boiled computer hacker Kidd and his sometime girlfriend LuEllen make for a refreshingly roguish couple” (Entertainment Weekly). Now they’re back in #1 New York Times bestselling author John Sandford’s electrifying novel of murder, intrigue, and revenge—Kidd style.
When Kidd’s superhacker friend Bobby is murdered and his laptop is stolen, Kidd knows it’s panic time. The secrets stashed in Bobby’s...
When Kidd’s superhacker friend Bobby is murdered and his laptop is stolen, Kidd knows it’s panic time. The secrets stashed in Bobby’s...
Author
Series
Pub. Date
2023.
Language
English
Description
"Lisbeth Salander returns, in a trailblazing new installment to the best-selling Millennium series. Change is coming to Sweden's far north: its untapped natural resources are sparking a gold rush with the criminal underworld leading the charge. But it's not the prospect of riches that brings Lisbeth Salander to the small town of Gasskas. She has been named guardian to her niece Svala, whose mother has disappeared. Two things soon become clear: Svala...
Author
Series
Millennium novels (Stieg Larsson) volume 5
Pub. Date
2017.
Language
English
Description
Lisbeth Salander has been forged by a brutal childhood and horrific abuse. And repeated attempts on her life. The ink embedded in her skin is a constant reminder of her pledge to fight against the injustice she finds on every side. Confinement to the secure unit of a women's prison is intended as a punishment. Instead, Lisbeth finds herself in relative safety. Flodberga is a failing prison, effectively controlled by the inmates, and for a computer...
Author
Publisher
McGraw-Hill Education
Pub. Date
[2018]
Edition
Fifth edition.
Physical Desc
1 online resource (1 volume) : illustrations
Language
English
Description
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, "Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition" explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code,...
Author
Series
Geronimo Stilton. Original series volume 68
Accelerated Reader
IL: MG - BL: 4.2 - AR Pts: 1
Language
English
Formats
Description
When Geronimo discovers someone has stolen his identity, he enlists Professor Margo Bitmouse, a well-known computer expert, to help him track down the thief.
Author
Series
Millennium novels (Stieg Larsson) volume 6
Language
English
Description
"Mikael Blomkvist is trying to reach Lisbeth Salander?the fierce, unstoppable girl with the dragon tattoo. He needs her help unraveling the identity of a man who died with Blomkvist's phone number in his pocket?a man who does not exist in any official records and whose garbled last words hinted at knowledge that would be dangerous to important people. But Lisbeth has disappeared. She's sold her apartment in Stockholm. She's gone dark. She's told no...
16) Brain Jack
Author
Accelerated Reader
IL: MG+ - BL: 5.6 - AR Pts: 12
Language
English
Formats
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
Publisher
Kanopy Streaming
Pub. Date
2015.
Physical Desc
1 online resource (1 video file, approximately 57 minutes) : digital, .flv file, sound
Language
English
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
18) Warcross
Author
Series
Warcross volume 1
Accelerated Reader
IL: UG - BL: 5.6 - AR Pts: 16
Language
English
Appears on these lists
Formats
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
Author
Series
Starlight's Shadow volume 2
Language
English
Formats
Description
A former hacker, soldier, and bounty hunter must stop a shadowy group of traitors who are focused on goading the galaxy's two superpowers into an interstellar war with the help of a very sexy weapons expert.
20) The last minute
Author
Series
Sam Capra novels volume 2
Pub. Date
2012
Language
English
Formats
Description
Ex-CIA agent Sam Capra is contacted by kidnappers to find and murder the one man that can expose them in exchange for his son's freedom.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request