Catalog Search Results
Author
Series
Millennium novels (Stieg Larsson) volume 2
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 30
Formats
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
Author
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 33
Description
"In the concluding volume of Stieg Larsson's Millenium trilogy, Lisbeth Salander lies in critical condition in a Swedish hospital, a bullet in her head. But she's fighting for her life in more ways than one: if and when she recovers, she'll stand trial for three murders. With the help of Mikael Blomkvist, she'll need to identify those in authority who have allowed the vulnerable, like herself, to suffer abuse and violence. And, on her own, she'll...
Author
Series
Millennium novels (Stieg Larsson) volume 1
Accelerated Reader
IL: UG - BL: 6.5 - AR Pts: 27
Formats
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
5) Ghost ship
Author
Series
NUMA files volume 12
Formats
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
6) The director
Author
Formats
Description
Graham Weber has been the director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber turns to a charismatic (and unstable) young man named James Morris who runs the Internet Operations Center. He's the CIA's in-house geek. Weber launches Morris on a...
7) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
8) Neuromancer
Author
Series
Appears on these lists
Formats
Description
The Matrix unfolds like neon origami beneath clusters and constellations of data. Constructs, AIs, live here. Somewhere, concealed by ice, Neuromancer is evolving. As entropy goes into reverse, Molly's surgical implants broadcast trouble from the ferro-concrete geodesic of the Sprawl. Maelcum, Rastafarian in space, is her best hope of rescue. But she and Case, computer cowboy, are busy stealing data from the almighty Megacorps. If the Megacorps do...
Author
Series
Sisterhood series volume 11
Formats
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
10) The Devil's Code
Author
Series
Kidd novels volume 3
Formats
Description
Before the chilling Prey novels, Sandford made his mark with computer genius Kidd. Now Kidd is back, but his colleague Jack Morrison is missing, and Kidd himself is being targeted in a national manhunt.
11) The empress file
Author
Series
Kidd novels volume 2
Formats
Description
The ultimate con game thriller from the bestselling master of suspense, featuring the con artist team of Kidd and LuEllen.
Author
Series
Outlaw chronicles volume 3
Description
Seventeen-year-old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world's largest corporations. But when the biggest job of her life goes wrong, she's plunged into a desperate situation with only one way out: one last hack that will either save her or kill her.
13) Alif the unseen
Author
Formats
Description
In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients, dissidents, outlaws, Islamists, and other watched groups, from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the State's electronic...
Author
Series
Kidd novels volume 4
Formats
Description
Kidd's friend, Bobby the superhacker, has been murdered. When Kidd goes to Bobby's house to investigate, he finds his battered body, but not his jazzed-up laptop. Now Kidd is doubly disturbed. The murderer is still at large and now has enough secret information to hang a whole lot of people, including Kidd himself. Dodging both the law and other computerheads who want Bobby's information, kidd has to move fast if he is going to survive.
15) Tron : legacy
Series
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
16) Sneakers
Pub. Date
2003.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
Author
Series
Adventures in extreme reading volume 1
Pub. Date
[2013]
Accelerated Reader
IL: MG - BL: 4.4 - AR Pts: 2
Description
Carter Lewis's Uncle Dan has invented a suit that creates a virtual reality world so that the person experiences and interacts with a book as if he were actually there--but when Carter and his cousin Isabelle put on the suits they discover that a hacker is playing games with them.
18) Little Brother
Author
Series
Accelerated Reader
IL: UG - BL: 5.9 - AR Pts: 17
Formats
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
19) Don't look now
Author
Series
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 13
Description
Noa continues her efforts to protect runaways from the illicit experiments being conducted by a sinister corporation, while hacker Peter struggles to support her and work against the company on behalf of his victimized girlfriend.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request