Catalog Search Results
Author
Series
Millennium novels (Stieg Larsson) volume 2
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 30
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
Author
Series
Outlaw chronicles volume 3
Description
Seventeen-year-old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world's largest corporations. But when the biggest job of her life goes wrong, she's plunged into a desperate situation with only one way out: one last hack that will either save her or kill her.
Author
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 33
Description
"In the concluding volume of Stieg Larsson's Millenium trilogy, Lisbeth Salander lies in critical condition in a Swedish hospital, a bullet in her head. But she's fighting for her life in more ways than one: if and when she recovers, she'll stand trial for three murders. With the help of Mikael Blomkvist, she'll need to identify those in authority who have allowed the vulnerable, like herself, to suffer abuse and violence. And, on her own, she'll...
Author
Series
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 13
Description
Noa continues her efforts to protect runaways from the illicit experiments being conducted by a sinister corporation, while hacker Peter struggles to support her and work against the company on behalf of his victimized girlfriend.
Author
Series
Millennium novels (Stieg Larsson) volume 1
Accelerated Reader
IL: UG - BL: 6.5 - AR Pts: 27
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
Author
Series
Accelerated Reader
IL: UG - BL: 5.9 - AR Pts: 17
Formats
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
8) Ghost ship
Author
Series
NUMA files volume 12
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
9) Homeland
Author
Series
Pub. Date
2013.
Accelerated Reader
IL: UG - BL: 6.7 - AR Pts: 20
Description
When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
10) Streams of Babel
Author
Series
Pub. Date
[2008]
Accelerated Reader
IL: UG - BL: 5.8 - AR Pts: 17
Description
Six teens face a bioterrorist attack on American soil as four are infected with a mysterious disease affecting their small New Jersey neighborhood and two others, both brilliant computer hackers, assist the United States Intelligence Coalition in tracking the perpetrators.
12) Burning blue
Author
Accelerated Reader
IL: UG - BL: 4.3 - AR Pts: 9
Description
When beautiful, smart Nicole, disfigured by acid thrown in her face, and computer hacker Jay meet in the school psychologist's office, they become friends and Jay resolves to find her attacker.
13) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
14) Neuromancer
Author
Series
Appears on these lists
Formats
Description
The Matrix unfolds like neon origami beneath clusters and constellations of data. Constructs, AIs, live here. Somewhere, concealed by ice, Neuromancer is evolving. As entropy goes into reverse, Molly's surgical implants broadcast trouble from the ferro-concrete geodesic of the Sprawl. Maelcum, Rastafarian in space, is her best hope of rescue. But she and Case, computer cowboy, are busy stealing data from the almighty Megacorps. If the Megacorps do...
15) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
16) Top 8
Author
Series
Top 8 novels volume 1
Pub. Date
2008
Accelerated Reader
IL: UG - BL: 5.2 - AR Pts: 9
Description
When popular high school junior Madison's online profile is hacked, it sends her life into turmoil and forces her to reevaluate some important matters as she figures out who committed the crime.
Pub. Date
c2007
Description
NYPD Detective John McClane has faced some brutal terrorists in his career, but now, he's about to face what may be his most dangerous enemy yet. John, who occasionally does work for the U.S. Department of Homeland Security, receives a call to bring in a hacker named Matt Farrell, because there has been a breach in an FBI computer system. Farrell is one of the many hackers who are suspected in the attack. As soon as John gets to Matt's apartment,...
Author
Series
Sisterhood series volume 11
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
20) The Devil's Code
Author
Series
Kidd novels volume 3
Formats
Description
Before the chilling Prey novels, Sandford made his mark with computer genius Kidd. Now Kidd is back, but his colleague Jack Morrison is missing, and Kidd himself is being targeted in a national manhunt.