Catalog Search Results
21) Don't let go
Author
Language
English
Formats
Description
"In his final installment of the Don't Turn Around trilogy, Noa, Peter, and what is left of their army race across the country in their search to destroy Project Persephone before time runs out"--
22) Remember me
Author
Language
English
Description
"Teen hacker Wick Tate has to decide between right and wrong as she tries to solve another murder and discover the truth about her mother's suicide"--
23) Dotwav
Author
Language
English
Description
Hacker Ani Lee is researching a strange .wav file, while Joe Dyson, an operative working for a secret teen division of British Inteligence, is looking into the disappearance of a friend caught up in the underground music scene. Their investigations intertwine.
24) Find me
Author
Language
English
Description
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.
25) City spies
Author
Language
English
Appears on list
Description
Sara Martinez is a hacker. She recently broke into the New York City juvenile justice system to expose her foster parents as cheats and lawbreakers. However, instead of being hailed as a hero, she finds herself facing years in a juvenile detention facility and banned from using computers. Enter Mother, a British spy who not only gets Sara released from jail but also offers her a chance to make a home for herself withing a secret team of young MI6...
26) City of halves
Author
Language
English
Description
Sixteen-year-old Lily is a skilled computer hacker looking for the man who faked a passport for her mother when she is attacked by a two-headed dog and rescued by the Eldritche Regan who plunges her to a London she never knew existed--a world of magic and supernatural creatures that is beginning to invade the human world.
29) Homeland
Author
Language
English
Formats
Description
When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
30) Chapelwood
Author
Language
English
Description
Birmingham, Alabama is infested with malevolence. Prejudice and hatred have consumed the minds and hearts of its populace. A murderer, unimaginatively named "Harry the Hacker" by the press, has been carving up citizens with a hatchet. And from the church known as Chapelwood, an unholy gospel is being spread by a sect that worships dark gods from beyond the heavens. This darkness calls to Lizzie Borden. It is reminiscent of an evil she had dared hoped...
31) Spell hacker
Author
Language
English
Description
"In Kyrkarta, magic--known as maz--was once a freely available natural resource. Then an earthquake released a magical plague, killing thousands and opening the door for a greedy corporation to make maz a commodity that's tightly controlled--and, of course, outrageously expensive. Which is why Diz and her three best friends run a highly lucrative, highly illegal maz siphoning gig on the side. Their next job is supposed to be their last heist ever....
Author
Language
English
Formats
Description
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website...
Author
Language
English
Description
Learn what session hijacking is, which protocols are vulnerable, and detect and shore up vulnerabilities in your systems.
One of the most sophisticated forms of cyberattacks is session hijacking. Hackers take over network, web, or service sessions—the valid interactions of unsuspecting users—in order to gain unauthorized access to data and systems and attack an organization from the inside. The root failure is weaknesses in common protocols....
34) Tabula rasa
Author
Language
English
Formats
Description
A girl who has been held in an experimental medical facility to remove the memories that gave her post-traumatic stress disorder begins to recover her memory after fleeing mercenaries sent to eliminate her.
35) Memoria activa
Author
Language
Español
Description
"For all the mysteries teen hacker Marisa Carneseca has solved, one has always eluded her: When she was two years old, she was in a car accident in which she lost her arm anda mob boss's wife, Zenaida de Maldonado, lost her life. No one can tell her what she was doing in that car, or how it led to the feud between the Carnesecas and the Maldonados. The secrets from the past rise violently to the surface when Zenaida's freshly severed hand shows up...
36) Red team blues
Author
Language
English
Description
"New York Times bestseller Cory Doctorow's Red Team Blues is a grabby next-Tuesday thriller about cryptocurrency shenanigans that will awaken you to how the world really works. Martin Hench is 67 years old, single, and successful in a career stretching back to the beginnings of Silicon Valley. He lives and roams California in a very comfortable fully-furnished touring bus, The Unsalted Hash, that he bought years ago from a fading rock star. He knows...
37) Active memory
Author
Language
English
Formats
Description
"Even in a world where technology connects everyone's minds, it would seem that some secrets can still remain hidden. For all the mysteries teen hacker Marisa Carneseca has solved, one has always eluded her: When she was two years old, she was in a car accident in which she lost her arm and a mob boss's wife, Zenaida de Maldonado, lost her life. No one can tell her what she was doing in that car, or how it led to the feud between the Carnesecas and...
38) Immoral code
Author
Language
English
Description
"Ocean's 8 meets The Breakfast Club in this fast-paced, multi-perspective story about five teens determined to hack into one billionaire absentee father's company to steal tuition money. For Nari, aka Narioka Diane, aka hacker digital alter ego "d0l0s," it's college and then a career at "one of the big ones," like Google or Apple. Keagan, her sweet, sensitive boyfriend, is happy to follow her wherever she may lead. Reese is an ace/aro visual artist...
39) The chaos of now
Author
Language
English
Description
Jordan committed suicide after being tirelessly bullied; now the school has access to students' online activities and students have less privacy than ever. Eli just wants to graduate, get away from this town and his father, and get himself a prestigious coding job. Then his hacking skills get him roped into a vigilante website that subverts the school's cybersnoops and seeks justice for everyone else being bullied. Unable to identify the fine lines...
Author
Language
English
Formats
Description
The secret must be kept... For three thousand years, the Herculean Society has preserved the legacy of the ancient hero, Hercules, protecting history's fragile relics from humanity, and humanity from the dangerous truths behind the legends. Now, the Society's new leader, archaeologist George Pierce, faces his first test: the Cerberus Group. A shadowy organization with two goals: the collection and distribution of black market relics, tech and secrets,...