Catalog Search Results
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Accelerated Reader
IL: UG - BL: 5 - AR Pts: 15
Description
When the NSA invincible code-breaking machine encounters a code it connot break, the agency calls in head cryptographer, Susan Fletcher. What she uncovers sends shock waves through the corridors of power. Caught in a tempest of secrecy and lies, Fletcher battles for her country, her life and the life of the man she loves.
Author
Series
Aimee Leduc investigations volume 3
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
5) Raptor 6
Author
Series
Quiet professionals volume 1
Description
Captain Dean Watters keeps his mission and his team in the forefront of his laser-like focus. So when these two things are threatened by hackers, Dean's Special Forces training kicks into high gear. Failing to stop the hackers from stealing national security secrets from the military's secure computers and networks isn't an option. Zahrah Zarrick is a missionary teacher to Afghan children in Mazar-e Sharif. And a target. When Zahrah is captured because...
Author
Pub. Date
[2022]
Description
"Longlisted for the Airey Neave Book Prize, Airey Neave Trust" Amy Zegart is senior fellow at the Hoover Institution and the Freeman Spogli Institute for International Studies at Stanford University and a contributing writer at The Atlantic. Her books include Spying Blind: The CIA, the FBI, and the Origins of 9/11 (Princeton) and (with Condoleezza Rice) Political Risk: How Businesses and Organizations Can Anticipate Global Insecurity. She lives in...
7) Hawk
Author
Series
Quiet professionals volume 2
Description
Raptor's communications expert, Staff Sergeant Brian "Hawk" Bledsoe, is struggling with his inner demons, leaving him on the verge of an "other than honorable" discharge. Plagued with corrupted intel, Raptor team continues to track down the terrorist playing chess with their lives. Afghan pilot Fekiria Haidary is devastated when a systems glitch on her aircraft forces a weapons launch on a safe target. And when the deadly bombing separates Hawk from...
8) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
9) Memory piece
Author
Pub. Date
2024.
Description
"In the early 1980s, Giselle Chin, Jackie Ong, and Ellen Ng are three teenagers drawn together by their shared sense of alienation and desire for something different. 'Allied in the weirdest parts of themselves,' they envision each other as artistic collaborators and embark on a future defined by freedom and creativity. By the time they are adults, their dreams are murkier. As a performance artist, Giselle must navigate an elite social world she never...
Author
Series
Pike Logan thrillers volume 17
Description
Conducting a routine cover development trip to Tajikistan, Pike and Jennifer learn that Afghanistan has fallen, and there's a man on the run. One that has done more for the United States in Afghanistan than anyone else. Pulled in to extract him, Pike collides headlong into a broader mystery: His covert company, along with every other entity in the Taskforce, has been hit with a ransomware attack, and there's some connection between the Taliban and...
11) Attack surface
Author
Series
Pub. Date
2020.
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counter-terrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
12) Zero days
Author
Pub. Date
c2019.
Description
A deadly virus is threatening the world's computers. It's smart, fast, and developed by a group of elite hackers. It can break through the highest security, crippling any system within seconds. It's the ultimate cyber weapon. Nobody understands the mind of a hacker quite like Chuck Drayton. But he's gone offline, rocked with guilt after a failed operation cost innocent lives. When Chuck is called back into action, he soon gets caught in the perilous...
Author
Pub. Date
2019.
Description
The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself.
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was...
Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was...
Author
Pub. Date
2016.
Description
The spectacular cyber-attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming-each one more pernicious than the last-from China, Russia, Iran, North Korea, the Middle East, and points...
Author
Pub. Date
[2018]
Description
Awakening from a dream with more than one hundred predictions about the future in his head, an unassuming Manhattan bassist becomes one of the world's most powerful men and hides his identity behind an online persona that is targeted by greedy corporations and dangerous enemies.
Author
Series
Pub. Date
[2019]
Description
Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity...
Author
Series
Rocky Mountain courage volume 3
Pub. Date
2022.
Description
"Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. But when a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and protect her father's company. Diplomatic Security Service special...
19) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Pub. Date
2022.
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
20) Cyber wars
Author
Series
Pub. Date
2018.
Accelerated Reader
IL: MG - BL: 7.8 - AR Pts: 1
Description
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace. Cyber Wars traces the outcomes of these efforts through eyewitness accounts, background information about conflicts, and question prompts that encourage critical thinking about the ways that technology affects world events.