Catalog Search Results
Author
Series
Magic 2.0 volume 1
Pub. Date
[2014]
Description
Martin Banks is just a normal guy who has made an abnormal discovery: he can manipulate reality, thanks to reality being nothing more than a computer program. With every use of this ability, though, Martin finds his little "tweaks" have not escaped notice. Rather than face prosecution, he decides instead to travel back in time to the Middle Ages and pose as a wizard. What could possibly go wrong? An American hacker in King Arthur's court, Martin must...
Pub. Date
c2007
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the U.S. Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. As soon as John gets to Matt's apartment,...
86) Homeland
Author
Series
Pub. Date
2013.
Description
When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
87) Olivia decoded
Author
Pub. Date
2016.
Description
After moving in with her grandfather, starting a new school, and ending her relationship with Jack, Olivia's plans to have a normal life are put on hold when she sees Jack again and is threatened by an unknown stalker.
88) Memory hackers
Pub. Date
[2016]
Description
Examines the physiological mechanisms underlying memory, the study of which has enabled scientists to explain and even control memory. Looks at the malleability of memory and the possible realities of implanting and erasing individual memories.
Author
Series
Dewey Andreas thrillers volume 5
Pub. Date
2015.
Description
"Dewey Andreas, former Delta and newly recruited intelligence agent, is sidelined after screwing up his last two operations. Still drowning in grief after the tragic murder of his fiance;, Dewey has seemingly lost his focus, his edge, and the confidence of his superiors. A high level Russian hacker, known only as Cloud, is believed to be routing large amounts of money to various Al Qaeda terror cells, and the mission is to capture and render harmless...
90) Mind games
Author
Pub. Date
[2019].
Description
Arden sells memories. Whether it's becoming homecoming queen or studying for an all-important test, Arden can hack into a classmate's memories and upload the experience for them just as if they'd lived it themselves. Business is great—until the day Arden looks up and sees the boy crossing the schoolyard. The boy her friend assures her she's known for years. The boy she can't remember. Arden soon realizes her own memories have been hacked, but they...
Author
Series
Man made Boy volume 2
Pub. Date
[2015]
Description
As Boy, the hacker son of Frankenstein's Monster and the Bride, moves to Switzerland to enroll in college, the secret world of monsters and mythical creatures, hiding in plain sight, is torn apart by conflict.
Author
Series
Sam Capra novels volume 2
Pub. Date
2012
Description
Sam Capra has one reason to live: to rescue his baby son from the people who abducted him. An ex-CIA agent, Sam now owns bars around the world as cover for his real mission - working for a secret network as mysterious as it is powerful, while using his skills to find his child. But the kidnappers have offered a deadly deal: they'll surrender Sam's child if Sam finds and assassinates the one man who can expose them. Teaming up with a desperate young...
94) Tron : legacy
Series
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
95) Hacking
Author
Pub. Date
[2013]
Description
Discusses the threat hacking poses to computer security.
96) Ghost Rendition
Author
Pub. Date
2021
Description
Gib Alexander is a divorced suburban dad who also happens to be a deadly efficient, off the books, CIA contractor. Balancing the demands of his perilous profession and his resentful ex-wife and troubled son is a dangerous juggling act. His safety and the safety of his family depend on his fanatical precautions to keep his two lives separate. When a young computer coder threatens a top secret NSA project that could tilt the balance in the escalating...
Series
Dragon tattoo trilogy volume 1
Pub. Date
2009.
Formats
Description
Forty years after a woman vanishes from a gathering of a powerful and secretive family, a journalist and a computer hacker are asked to solve the mystery of her disappearance.
99) The passengers
Author
Pub. Date
2019.
Description
"You're riding in your self-driving car when suddenly the doors lock, the route changes and you have lost all control. Then, a mysterious voice tells you, "You are going to die". Just as self-driving cars become the trusted, safer norm, eight people find themselves in this terrifying situation, including a faded TV star, a pregnant young woman, an abused wife fleeing her husband, an illegal immigrant, a husband and wife, and a suicidal man. From cameras...
Author
Series
Kidd and LuEllen volume 4
Pub. Date
c2003
Description
In this novel, the author brings back his popular characters Kidd and LuEllen, in an electrifying novel of murder and Machiavellian intrigue.