Catalog Search Results
Description
A fearsomely independent teenage girl who is always willing to help out the people she cares about by often using her expert computer hacking skills even if it means sometimes breaking the law. Now on the run with the cops on her trail for being accuse of a mysterious older man's death, Holly makes it her mission to clear her name and find the man who murdered her best friend.
Author
Description
"Lisbeth Salander has been forged by a brutal childhood and horrific abuse. And repeated attempts on her life. The ink embedded in her skin is a constant reminder of her pledge to fight against the injustice she finds on every side. Confinement to the secure unit of a women's prison is intended as a punishment. Instead, Lisbeth finds herself in relative safety. Flodberga is a failing prison, effectively controlled by the inmates, and for a computer...
Author
Formats
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
4) The signal
Description
While on a roadtrip, Nic and two friends are drawn to an isolated by a computer genius, and soon Nic finds himself in a living nightmare in an isolation unit.
Author
Description
When Bobby, an artist, computer hacker, and friend of Kidd, suddenly disappears from cyberspace, Kidd gets really worried. When Kidd finds Bobby dead on the floor of his house with his laptop missing, Kidd realizes that everybody in Bobby's circle of friends, including himself, are in jeopardy if the contents of the laptop are disclosed.
7) Swordfish
Description
When the DEA shuts down a dummy corporation operation code named SWORDFISH, they had generated $400 million which they let sit around; years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by Gabriel, wants the money to help finance their war against international terrorism, but it's all locked away behind super-encryption. He brings in convicted hacker Stanley, who only wants to see his...
9) City spies
Author
Description
Sara Martinez is a hacker. She recently broke into the New York City juvenile justice system to expose her foster parents as cheats and lawbreakers. However, instead of being hailed as a hero, she finds herself facing years in a juvenile detention facility and banned from using computers. Enter Mother, a British spy who not only gets sara released from jail but also offers her a chence to make a home for herself withing a secret team of your MI6 agents....
10) Tron: legacy
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
Author
Formats
Description
The Girl is back. In this adrenaline-charged, up-to-the-moment political thriller, Stieg Larsson's Lisbeth Salander and Mikael Blomkvist, the troubled genius hacker and crusading journalist thrilled the world in The Girl with the Dragon Tattoo, The Girl Who Played with Fire, and The Girl Who Kicked the Hornet's Nest, are back. Late one night, Blomkvist receives a phone call from a source claiming to have information vital to the United States. The...
Author
Formats
Description
Mikael Blomkvist is publishing the story of his career, exposing the extensive sex trafficking operation between Sweden and Eastern Europe, but when two investigative journalists are killed the night before the story runs and Lisbeth Salander is implicated, Mikael vows to clear the girl's name and find the true killer.
13) Cruel intent
Author
Formats
Description
When her contractor's unfaithful wife is brutally murdered, former TV anchorwoman Ali Reynolds sets out to prove the husband's innocence in spite of skepticism on the part of Ali's detective boyfriend, a situation that catches the attention of the real killer.
14) The eye of minds
Author
Formats
Description
Michael is a gamer. And like most gamers, he almost spends more time on the VirtNet than in the actual world. The VirtNet offers total mind and body immersion, and it's addictive. Thanks to technology, anyone with enough money can experience fantasy worlds, risk their life without the chance of death, or just hang around with Virt-friends. And the more hacking skills you have, the more fun. Why bother following the rules when most of them are dumb,...
15) Hackers
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
16) Net force
Author
Description
In the year 2010, computers are the new superpowers. Those who control them, control the world. To enforce the Net Laws, Congress creates the ultimate computer security agency within the FBI: Net Force.
17) Frankie go boom
Description
For his whole life Frank has been tortured, embarrassed and humiliated on film by his horrible brother, Bruce. When Bruce makes and uploads a video of a disastrous one-night stand of Frank's, the sex tape immediately becomes a viral hit and things really hit the fan. Will Jack, Bruce's violent drug-fiend rehab buddy, find out it's his daughter in the video? Can Phyllis, Bruce's transsexual computer hacker prison buddy, get them out of trouble?
20) Cryptonomicon
Author
Formats
Description
More than fifty years after Lawrence Pritchard Waterhouse and Sergeant Bobby Shaftoe are assigned to Detachment 2702, a secret cryptographic mission, their grandchildren--Randy and Amy--join forces to create a "data haven" in the South Pacific, only to uncover a massive conspiracy with roots in Detachment 2702.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request