Catalog Search Results
1) Wildcard
Author
Language
English
Appears on list
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
Emika Chen barely made it out of the Warcross Championships alive. Knowing the truth behind Hideo's new NeuroLink algorithm, she is determined to put a stop to his plans. But someone has put a bounty on Emika's head, and her sole chance for survival lies with Zero and the Blackcoats, his ruthless...
Author
Language
English
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
4) Warcross
Author
Language
English
Appears on list
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--Provided by the publisher.
5) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
6) Cyber crime
Author
Language
English
Description
Describes the crimes committed with computers over the internet and various law enforcement agencies who fight cyber crimes. Includes real-life case studies and examples of crimes solved around the world.
Author
Language
English
Description
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day....
8) Cybercrime
Language
English
Description
Presents a collection of essays that debate various topics pertaining to cybercrime, including whether cybercrime is a major issue, how criminals use online media to commit crimes, and which laws can be passed to prevent or reduce the occurrence of cybercrime.
Author
Language
English
Formats
Description
"Cyberbullying among teens happens every day. Harsh words and damaging photos exchanged through texts, email, or social media can result in humiliation, broken friendships, punishment at school, and even legal prosecution. In some cases, online harassment has contributed to suicide. Faced with this frightening problem, parents, educators, and teens are looking for information and advice. But few cyberbullying resources speak to teens themselves. Written...
10) Dark angel
Author
Language
English
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas and her incredible skills with firearms draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant partner...
Author
Language
English
Description
This book looks at the topics of computer science and information and communications technology to explain how computers and networks can be compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.
12) Wired: a novel
Author
Language
English
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Times bestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
13) Constant fear
Author
Language
English
Formats
Description
A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds.
When a drunk-driving accident ruined his life, only a popular survivalist blog helped to restore Jake's sense of control. He's become an avid Doomsday Prepper, raising his diabetic son, Andy, to be ready for any sudden catastrophe. Jake works as a custodian at isolated Pepperell Academy...
Language
English
Description
We'd like to think they're invincible, but America's power stations, water supplies, financial systems, and military communications are all vulnerable to attack. And the most pressing threat isn't from bombs or other physical dangers-it's from computer hacking. What can be done to protect our infrastructure and prevent a devastating digital assault? To find out, this CNBC Original documentary goes to the frontlines of the war on cybercrime and cyber-terrorism....
15) Brainy Bees
Language
English
Description
Reacting quickly in an emergency depends increasingly on security cameras to recognize faces. We have special regions of the brain dedicated to the task of face recognition and constantly do it without effort or a second thought. But for computers and security systems it's more difficult. In this video clip, hear from scientists who are studying the way bees see and process the world in an attempt to improve surveillance technology.
Author
Language
English
Formats
Description
"Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. Contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen"--
20) Cyberbullying
Language
English
Description
Explores the issues surrounding cyberbullying--bullying through the Internet--by placing opinions from a wide range of sources in a pro/con format.