Catalog Search Results
2) Ghost ship
Author
Series
Description
"When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown, or was the yacht abandoned when he came aboard? For reasons he cannot explain, Kurt doesn't trust either version of his recollection. Determined to know the truth, he begins to search for answers, and soon finds himself descending into a shadowy world of state-sponsored...
3) Warcross
Author
Series
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
4) Wired
Author
Series
Formats
Description
A beautiful computer hacker and a bad-boy FBI agent must collaborate—in more ways than one—in this sexy, suspenseful novel from #1 New York Times bestselling author Julie Garwood.
Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing—and hacking—code....
Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing—and hacking—code....
5) Chat
Author
Series
Formats
Description
"When a wintertime car accident leaves his mother and brother seriously injured, Joe Gunther takes a leave of absence to attend to them and investigate the cause of the crash"--Provided by publisher.
Pub. Date
2014.
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Pub. Date
2014.
Description
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and cyber incidents. Track: Peak performance methodologies and proven practices that advance the management skills of IT professionals....
Pub. Date
2014.
Description
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to the ever changing landscape of cyber security threats. In this report, Jason Mical, Director of Network Forensics...
Pub. Date
2015.
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
10) Zero days
Pub. Date
[2017]
Edition
Widescreen.
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
11) Dark angel
Author
Series
Letty Davenport novels volume 2
Appears on list
Description
Letty Davenport's actions at a gunfight in Texas draw the attention of the US government. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her partner from the NSA pose as programmers for hire and embark on a road trip to the group's California headquarters. While the two work to make inroads with Ordinary People and uncover...
Author
Series
Pub. Date
[2019]
Description
"A crime has occurred. Investigators have not yet found evidence. But when digital analysts arrive, they take a computer from the scene and find their first clue. Find out about the techniques and tools digital forensic investigators use to help bring even the toughest cases to a close." -- Goodreads.
14) Online security
Author
Series
Pub. Date
c2012
Description
Discusses online security in the digital age, including the risk of identity theft, Internet attacks on corporate networks, and cyberterrorism, and describes methods to help secure online information both currently and in the future.
Author
Pub. Date
c2010
Description
Powerful collection of landmark court cases involving teens and charges of cyberbullying, which includes: sending insulting or threatening emails, text, or instant messages directly to someone; spreading hateful comments about someone through emails, blogs, or chat rooms; stealing passwords and sending out threatening messages using a false identity; and building a Web site to target specific people. Each chapter features the seminal case and resulting...
Author
Pub. Date
[2019]
Description
"In this book, readers will learn the necessary steps to stay safe online. Carefully-leveled text and vibrant, full-color photographs help readers understand that an informed citizenship relies on the critical and responsible usage of media and information. Staying Safe Online features reading tips for teachers and parents, a table of contents, a Take Action! activity, compelling questions to encourage deeper inquiry, a glossary, and an index." --...
Author
Series
Warcross volume 2
Pub. Date
2018.
Edition
Large print edition.
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats." -- Provided by publisher.
In NH Statewide Interlibrary Loan
Didn't find what you need? Items not owned by NNHLC libraries can be requested statewide to be delivered here for pickup. Click the button below to search, login with the same 14 digit barcode and password you use to login here. We will contact you when it's here for you to pick up.
Didn't find it?
Can't find what you are looking for? Send us a purchase suggestion. Submit suggestion