Catalog Search Results
Author
Description
"Lisbeth Salander has been forged by a brutal childhood and horrific abuse. And repeated attempts on her life. The ink embedded in her skin is a constant reminder of her pledge to fight against the injustice she finds on every side. Confinement to the secure unit of a women's prison is intended as a punishment. Instead, Lisbeth finds herself in relative safety. Flodberga is a failing prison, effectively controlled by the inmates, and for a computer...
Author
Description
When Bobby, an artist, computer hacker, and friend of Kidd, suddenly disappears from cyberspace, Kidd gets really worried. When Kidd finds Bobby dead on the floor of his house with his laptop missing, Kidd realizes that everybody in Bobby's circle of friends, including himself, are in jeopardy if the contents of the laptop are disclosed.
3) Cruel intent
Author
Description
When her contractor's unfaithful wife is brutally murdered, former TV anchorwoman Ali Reynolds sets out to prove the husband's innocence in spite of skepticism on the part of Ali's detective boyfriend, a situation that catches the attention of the real killer.
Author
Description
Juan Cabrillo and the crew of the Oregon face their toughest challenge yet when a violent bank heist during the Monaco Grand Prix decimates the Corporation's accounts. To get the money back, Juan joins forces with an old friend from his days in the CIA so they can track down a rogue hacker and a ruthless former Ukrainian naval officer. It is only after the hunt begins that the enormity of the plan comes into focus: the bank theft is just the first...
5) The fox
Author
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
6) Ghost ship
Author
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht' he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown' or was the yacht abandoned when he came aboard? Kurt doesn't trust either recollection. Searching for answers' he soon finds himself descending into a shadowy world of state-sponsored cybercrime' and uncovering a web of human trafficking.
7) Dark angel
Author
Description
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more...
8) Blindside
Author
Description
The mayor of New York has a daughter who's missing and in danger. Detective Michael Bennett has a son who's in prison. The two strike a deal. Bennett and the mayor have always had a tense relationship, but now the mayor sees in Bennett a discreet investigator with family worries of his own. Just one father helping another. The detective leaps into the case and sources lead him to a homicide in the Bronx. The victim has ties to a sophisticated hacking...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request