Catalog Search Results
1) Black widow
Author
Description
Entreated by his goddaughter to help pay off a blackmailer who videotaped her bachelorette party and then threatened to expose her debauchery, Doc Ford reluctantly agrees and then finds himself in danger when the extortionist releases the tape anyway.
2) The cipher
Author
Description
"Robert 'Smiles' Smylie and his friend Ben become embroiled in a high-stakes negotiation with a pair of suspicious Feds when Ben cracks a code with the power to unlock all the Internet's secrets"--
3) Firewall
Description
Thieves threaten to kill Jack Stanfield's family if he doesn't hack into a computer system through a firewall he designed in order to transfer 100 million dollars to an offshore account.
4) Fear No Evil
Author
Description
Instead of preparing for her high school graduation, Lucy Kincaid is facing a vicious execution. Lured by an online predator, she is destined to die horribly, live on the Internet, while hundreds of heartless viewers watch and vote on the method of her slaughter. Her only hope rests with Kate Donovan, an FBI agent who took on the same sadistic killer once before.
5) The fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
6) Snowden
Description
An employee of the National Security Agency leaks their illegal surveillance techniques to the public by distributing thousands of classified documents to the press.
7) Ghost ship
Author
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht' he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown' or was the yacht abandoned when he came aboard? Kurt doesn't trust either recollection. Searching for answers' he soon finds himself descending into a shadowy world of state-sponsored cybercrime' and uncovering a web of human trafficking.
8) 1st case
Author
Formats
Description
"Angela's graduate school days at MIT come to an abrupt end when she uses her hacking skills on another student's computer. Yet her mentor, Eve Abajian, arranges a new beginning for her -- as an intern in FBI's Boston field office. Her new supervisor, Assistant Special Agent in Charge William Keats, one of only two agents in the Northeast to make his rank before the age of thirty, sees in Angela a fellow prodigy. But Angela's skills come with a natural...
Author
Formats
Description
On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for sabotage, with deadly consequences. As it turns out, the danger is worse than she thought. A spatter of dried blood, a missing security badge, a suspicious suicide-a...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request