Catalog Search Results
Author
Series
Millennium trilogy volume 2
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander, the troubled, wise-beyond-her-years genius hacker who came to his aid years before. Lisbeth Salander is a wanted woman. Her history of unpredictable and vengeful behaviour makes her an official...
Author
Series
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
The women of the sisterhood have to choose between two assignments, one which could make them more money than they could even imagine and the other even more valuable: a presidential pardon with a chance to emerge from hiding.
Author
Series
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Formats
Description
She is the girl with the dragon tattoo?a genius hacker and uncompromising misfit. He is a crusading journalist whose championing of the truth often brings him to the brink of prosecution. Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The source has been in contact with a young female superhacker?a hacker resembling someone Blomkvist knows all too well. The implications are staggering....
Author
Series
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
After taking a bullet to the head, Lisbeth Salander is under close supervision in intensive care. If and when she recovers, she'll be taken back to Stockholm to stand trial for three murders and one attempted murder. With the help of her friend, journalist Mikael Blomkvist and his researchers at Millennium magazine, she will not only have to prove her innocence, but also identify and denounce those in authority who have allowed the vulnerable, like...
7) Zero days
Author
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Formats
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Series
Millennium trilogy volume 1
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
Author
Series
City spies volume 4
Publisher
Aladdin
Pub. Date
2023.
Language
English
Description
When hackers target locations all over London, Kat leads the City Spies in testing security for the British Museum where a secret message leads them to Egypt and the ancient City of the Dead.
10) Warcross
Author
Series
Warcross volume 1
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Formats
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
The obsession started ten years ago and its fan base now spans the globe, some eager to escape from reality and others hoping to make a profit. Struggling to make ends meet, teenage hacker Emika Chen works as a bounty hunter,...
12) The eye of minds
Author
Series
Mortality doctrine volume 1
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
Michael is a gamer. And like most gamers, he almost spends more time on the VirtNet than in the actual world. The VirtNet offers total mind and body immersion, and it's addictive. Thanks to technology, anyone with enough money can experience fantasy worlds, risk their life without the chance of death, or just hang around with Virt-friends. And the more hacking skills you have, the more fun. Why bother following the rules when most of them are dumb,...
Author
Series
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
"The new Oregon Files adventure from the #1 New York Times-bestselling grand master of adventure. Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after...
Author
Publisher
No Starch Press
Pub. Date
Not Supplied
Language
English
Formats
Description
"In Penetration Testing, security researcher and trainer Georgia Weidman provides you with a survey of important skills that any aspiring pentester needs. This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network...
Author
Publisher
Not Supplied
Pub. Date
Not Supplied
Language
English
Description
Kevin Mitnick was the most elusive computer break-in artist in history. He accessed computers and networks at the world's biggest companies -- and no matter how fast the authorities were, Mitnick was faster, sprinting through phone switches, computer systems, and cellular networks. As the FBI's net finally began to tighten, Mitnick went on the run, engaging in an increasingly sophisticated game of hide-and-seek that escalated through false identities,...