Catalog Search Results
Description
A fearsomely independent teenage girl who is always willing to help out the people she cares about by often using her expert computer hacking skills even if it means sometimes breaking the law. Now on the run with the cops on her trail for being accuse of a mysterious older man's death, Holly makes it her mission to clear her name and find the man who murdered her best friend.
Author
Description
"Lisbeth Salander has been forged by a brutal childhood and horrific abuse. And repeated attempts on her life. The ink embedded in her skin is a constant reminder of her pledge to fight against the injustice she finds on every side. Confinement to the secure unit of a women's prison is intended as a punishment. Instead, Lisbeth finds herself in relative safety. Flodberga is a failing prison, effectively controlled by the inmates, and for a computer...
4) The signal
Description
While on a roadtrip, Nic and two friends are drawn to an isolated by a computer genius, and soon Nic finds himself in a living nightmare in an isolation unit.
Author
Description
When Bobby, an artist, computer hacker, and friend of Kidd, suddenly disappears from cyberspace, Kidd gets really worried. When Kidd finds Bobby dead on the floor of his house with his laptop missing, Kidd realizes that everybody in Bobby's circle of friends, including himself, are in jeopardy if the contents of the laptop are disclosed.
6) Swordfish
Description
When the DEA shuts down a dummy corporation operation code named SWORDFISH, they had generated $400 million which they let sit around; years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by Gabriel, wants the money to help finance their war against international terrorism, but it's all locked away behind super-encryption. He brings in convicted hacker Stanley, who only wants to see his...
7) Tron: legacy
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
9) Cruel intent
Author
Description
When her contractor's unfaithful wife is brutally murdered, former TV anchorwoman Ali Reynolds sets out to prove the husband's innocence in spite of skepticism on the part of Ali's detective boyfriend, a situation that catches the attention of the real killer.
11) Hackers
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
12) Frankie go boom
Description
For his whole life Frank has been tortured, embarrassed and humiliated on film by his horrible brother, Bruce. When Bruce makes and uploads a video of a disastrous one-night stand of Frank's, the sex tape immediately becomes a viral hit and things really hit the fan. Will Jack, Bruce's violent drug-fiend rehab buddy, find out it's his daughter in the video? Can Phyllis, Bruce's transsexual computer hacker prison buddy, get them out of trouble?
13) This mortal coil
Author
Formats
Description
"In a world where people are implanted with technology to recode their DNA, gene-hacking genius Cat must decrypt her late father's message concealing a vaccine to a horrifying plague"--
Author
Formats
Description
Mikael Blomkvist is publishing the story of his career, exposing the extensive sex trafficking operation between Sweden and Eastern Europe, but when two investigative journalists are killed the night before the story runs and Lisbeth Salander is implicated, Mikael vows to clear the girl's name and find the true killer.
15) Net force
Author
Description
In the year 2010, computers are the new superpowers. Those who control them, control the world. To enforce the Net Laws, Congress creates the ultimate computer security agency within the FBI: Net Force.
Author
Formats
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
Description
Lisbeth Salander, the highly-skilled vigilante from the acclaimed Millennium book series is back. Salander and journalist Mikael Blomkvist find themselves caught in a web of spies, cybercriminals and corrupt government officials, as they race to rescue a dangerous program capable of global destruction held by shadowy figures linked to Lisbeth's past.
Description
The final installment of Stieg Larsson's 'Millennium' trilogy. Lisbeth Salander is fighting for her life in more ways than one. In an intensive care unit and charged with three murders, she will have to not only prove her innocence, but also identify and denounce the same corruptgovernment institutions that nearly destroyed her life. Once upon a time, she was a victim. Now, Lisbeth Salander is fighting back.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request