Catalog Search Results
1) Hush-hush
Author
Series
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
2) 1st case
Author
Formats
Description
"Recruited into the FBI when her unorthodox programming skills get her kicked out of MIT, a computer genius tracks a killer who has been targeting young women through a sophisticated messaging app."--
Author
Pub. Date
[2019]
Description
"The new domestic suspense novel from NYT bestselling author Shari Lapena. Maybe you don't know your neighbours as well as you thought you did.... 'This is a very difficult letter to write. I hope you will not hate us too much... My son broke into your home recently while you were out.' In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well--learning their secrets, and maybe sharing...
Author
Formats
Description
Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away.
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the...
Through the weaponization of social media, the internet is changing war and politics, just as war and politics are changing the internet. Terrorists livestream their attacks, "Twitter wars" produce real-world casualties, and viral misinformation alters not just the result of battles, but the...
Author
Publisher
W.W. Norton and Company
Pub. Date
[2023]
Description
It's not just computers--hacking is everywhere. Legendary cybersecurity expert and New York Times best-selling author Bruce Schneier reveals how using a hacker's mindset can change how you think about your life and the world.
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our...
7) Hackers
Author
Series
Publisher
QEB
Pub. Date
2019
Description
What are hackers? Are they good? Bad? What can we do to protect ourselves, businesses and society against hackers? How can we control them? And should we try?
Author
Series
Publisher
Mason Crest
Pub. Date
[2020]
Description
"Readers of Cool Careers In Science will discover ten cutting-edge science, technology, and engineering careers, and dozens of subspecialties and will also learn why these careers are some of the most exciting, best paying, and fastest growing occupations in the world"--
Author
Series
Publisher
Tor
Pub. Date
2020.
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Series
Pike Logan thriller volume 17
Description
When his covert company, along with every other entity in the Taskforce, is hit with a ransomware attack linked to the Taliban, Pike must stop a plot to alter the balance of power on the global stage orchestrated by a former NSA specialist in the U.S. government.
Author
Publisher
Wednesday Books
Pub. Date
2022.
Accelerated Reader
IL: UG - BL: 4.8 - AR Pts: 14
Description
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
Author
Publisher
Crown Publishers
Pub. Date
[2018]
Description
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants...
Author
Formats
Description
"Now that every detail and argument set forth in the #1 New York Times bestseller The Russia Hoax has been borne out by the Mueller report, the author is back with a hard-hitting, well-reasoned evisceration of what may be the dirtiest trick in political history"--
Washington insiders broke rule after rule investigating a Russian conspiracy that turned out not to exist. Somehow this was spun into Donald Trump having something to hide. Jarrett uncovers...
Author
Publisher
Recorded Books, Inc
Pub. Date
[2022]
Description
A one-man team of experts, Stephen Leeds is a genius of unparalleled mental capabilities who can learn new skills or master entire scholarly disciplines in mere hours. However, these skills come at a price. When an unprecedented Internal Revenue Service data breach stumps the FBI, Stephen is brought in to investigate. He must uncover the connection between millions of stolen tax returns, a mysterious hacker named Enoch, a strange, cutting-edge technology...
15) The Mueller report: the final report of the Special Counsel into Donald Trump, Russia, and collusion
Author
Publisher
Skyhorse Publishing
Pub. Date
[2019]
Description
"There has never been a more important political investigation than Robert S. Mueller III's into President Donald Trump's possible collusion with Russia. His momentous findings can be found here, complete with: -- The 300+ pages of the historic report -- An introduction by constitutional scholar, eminent civil libertarian, and New York Times bestselling author Alan Dershowitz. -- The relevant portions of Title 28 of the Code of Federal Regulations,...
16) We are all targets: how renegade hackers invented cyber war and unleashed an age of global chaos
Author
Publisher
Hachette Books
Pub. Date
2023.
Description
"The incredible untold origin story of cyberwar and the hackers who unleashed it on the world, tracing their journey from the ashes of the Cold War to the criminal underworld, governments, and even Silicon Valley"--
17) Watch dogs 2
Publisher
Ubisoft
Pub. Date
[2016] ©2016
Description
Check out the birthplace of the tech revolution as Marcus Holloway, a brilliant young hacker who has fallen victim to ctOS 2.0's predictive algorithms and accused of a crime he did not commit. In Marcus' mission to shut down ctOS 2.0 for good, hacking is his ultimate weapon. Players not only can hack into the San Francisco Bay Area's infrastructure, but also into every person and any connected device they possess to trigger unpredictable chains of...
Didn't Find It?
If we don't have what you're looking for, you have 3 options: ask us to bring it in from another library (interlibrary loan), suggest the library purchase it, or call us for assistance.
Didn't find it?
Can't find what you are looking for? You can suggest the library purchase it by submitting a request, or you might find it through our interlibrary loan service. See your options at https://readokaloosa.org/requests. Purchase Suggestion