Catalog Search Results
1) Zero days
Author
Pub. Date
2023.
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jacintha "Jack" Cross and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to...
Author
Series
Pub. Date
2020.
Language
English
Description
Cory Doctorow's Attack Surface is a standalone novel set in the world of New York Times bestsellers Little Brother and Homeland.
Most days, Masha Maximow was sure she'd chosen the winning side.
In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic,
3) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first...
Author
Series
Language
English
Description
The third Aimée Leduc Investigation set in Paris
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
When Parisian private investigator Aimée Leduc picks up the phone one hot July afternoon, the call turns her life upside-down. The voice on the other end, with its heavy German accent, belongs to a woman named Jutta Hald. Jutta claims to have shared a jail cell with Aimée’s long-lost mother, a suspected terrorist on Interpol’s most wanted list....
Author
Language
English
Description
A former National Security Agency programmer threatens to release a mathematical formula that will allow organized crime and terrorism to skyrocket, unless the code-breaking computer that is used to keep them in check--but that violates civil rights--is not exposed to the public.
8) Exegesis
Author
Publisher
Vintage Contemporaries
Pub. Date
1997.
Physical Desc
approximately 225 pages ; 21 cm
Language
English
Author
Series
Rocky Mountain courage volume 3
Language
English
Description
"Mackenzie Hanson's special set of skills opened the door to a successful career as a professor of cybersecurity at a Michigan university, allowing her to put her criminal past behind her. But when a long-ago partner in crime delivers a cryptic message about her father's tech company being under cyberattack, she heads for Montana to secure exposed assets, close security breaches, and protect her father's company. Diplomatic Security Service special...
Author
Language
English
Formats
Description
When one of her clients is murdered, psychologist Grace Callahan quickly realizes that computer security specialist Stephen Shaw wasn't suffering from paranoia. What she doesn't know is that someone believes Shaw gave her a vital piece of information before he died and they are ready to silence her at any cost. Her only hope may be an old friend, Detective Nate Quinn, who has just been cleared for active duty after a bombing killed his partner and...
11) The zenith angle
Author
Publisher
Ballantine Books
Pub. Date
[2004]
Edition
First edition.
Physical Desc
306 pages ; 25 cm
Language
English
Author
Series
Bromance book club volume 3
Pub. Date
2020.
Language
English
Description
"A hacktivist and a cat café owner decode the friend zone in this romantic comedy from the author of Undercover Bromance. Alexis Carlisle and her cat café, ToeBeans, have shot to fame after she came forward as a victim of a celebrity chef's sexual harassment. When a new customer approaches to confide in her, the last thing Alexis expects is for the woman to claim they're sisters. Unsure what to do, Alexis turns to the only man she trusts--her best...
Author
Publisher
Syngress
Pub. Date
©2009
Physical Desc
1 online resource (xxxi, 1038 pages) : illustrations
Language
English
Description
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that...
15) The fox
Author
Language
English
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Series
Tom Clancy's Net Force (Adult series) volume 11
Language
English
Formats
Description
"The number one threat to our nation's security is in cyberspace. The new US president wants to tackle the urgent problem head-on and launches a top secret line of defense: Net Force. But before the organization can be announced, the country is hit by an unprecedented, two-pronged terror attack. Not yet empowered by Congress nor embraced by a dubious intelligence community, still untested, unproven and officially unnamed, Net Force's elite group of...
Author
Series
Publisher
Syngress
Pub. Date
©2003
Physical Desc
1 online resource (xxii, 303 pages) : illustrations
Language
English
Description
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who...
Series
Publisher
Distributed by O'Reilly Media
Pub. Date
©2005
Physical Desc
1 online resource (xxiv, 333 pages) : illustrations
Language
English
Description
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and...
Interlibrary loan through ILLiad
Didn't find what you need? Items not owned by Knox County Public Library can be requested from other libraries to be delivered to your pickup location.
Suggest a purchase
If it is too new for interlibrary loan (6 months), you can place a suggestion with us. Suggest a Purchase