Catalog Search Results
Author
Series
Sisterhood series volume 11
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
Author
Series
Outlaw chronicles volume 3
Description
Seventeen-year-old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world's largest corporations. But when the biggest job of her life goes wrong, she's plunged into a desperate situation with only one way out: one last hack that will either save her or kill her.
Author
Series
Accelerated Reader
IL: UG - BL: 5.9 - AR Pts: 17
Formats
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
4) Neuromancer
Author
Series
Appears on these lists
Formats
Description
The Matrix unfolds like neon origami beneath clusters and constellations of data. Constructs, AIs, live here. Somewhere, concealed by ice, Neuromancer is evolving. As entropy goes into reverse, Molly's surgical implants broadcast trouble from the ferro-concrete geodesic of the Sprawl. Maelcum, Rastafarian in space, is her best hope of rescue. But she and Case, computer cowboy, are busy stealing data from the almighty Megacorps. If the Megacorps do...
6) Brain Jack
Author
Pub. Date
2010
Accelerated Reader
IL: MG+ - BL: 5.6 - AR Pts: 12
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
Author
Pub. Date
2010
Accelerated Reader
IL: MG+ - BL: 6.1 - AR Pts: 9
Description
After escaping Camp Twilight, eighteen-year-old Carl Hobbes and Beth, his girlfriend, begin a new life in London, England, where he attempts to program Sphynx Cargo's highly intelligent supercomputer to help protect them from the CIA and assassins.
Author
Series
Kidd novels volume 4
Formats
Description
Kidd's friend, Bobby the superhacker, has been murdered. When Kidd goes to Bobby's house to investigate, he finds his battered body, but not his jazzed-up laptop. Now Kidd is doubly disturbed. The murderer is still at large and now has enough secret information to hang a whole lot of people, including Kidd himself. Dodging both the law and other computerheads who want Bobby's information, kidd has to move fast if he is going to survive.
11) The empress file
Author
Series
Kidd novels volume 2
Formats
Description
The ultimate con game thriller from the bestselling master of suspense, featuring the con artist team of Kidd and LuEllen.
12) The Devil's Code
Author
Series
Kidd novels volume 3
Formats
Description
Before the chilling Prey novels, Sandford made his mark with computer genius Kidd. Now Kidd is back, but his colleague Jack Morrison is missing, and Kidd himself is being targeted in a national manhunt.
13) Ghost ship
Author
Series
NUMA files volume 12
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
14) Burning blue
Author
Accelerated Reader
IL: UG - BL: 4.3 - AR Pts: 9
Description
When beautiful, smart Nicole, disfigured by acid thrown in her face, and computer hacker Jay meet in the school psychologist's office, they become friends and Jay resolves to find her attacker.
Author
Series
Millennium novels (Stieg Larsson) volume 2
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 30
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
16) Don't look now
Author
Series
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 13
Description
Noa continues her efforts to protect runaways from the illicit experiments being conducted by a sinister corporation, while hacker Peter struggles to support her and work against the company on behalf of his victimized girlfriend.
17) Streams of Babel
Author
Series
Pub. Date
[2008]
Accelerated Reader
IL: UG - BL: 5.8 - AR Pts: 17
Description
Six teens face a bioterrorist attack on American soil as four are infected with a mysterious disease affecting their small New Jersey neighborhood and two others, both brilliant computer hackers, assist the United States Intelligence Coalition in tracking the perpetrators.
18) Homeland
Author
Series
Pub. Date
2013.
Accelerated Reader
IL: UG - BL: 6.7 - AR Pts: 20
Description
When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
Author
Series
Millennium novels (Stieg Larsson) volume 1
Accelerated Reader
IL: UG - BL: 6.5 - AR Pts: 27
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
20) Alif the unseen
Author
Formats
Description
In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients, dissidents, outlaws, Islamists, and other watched groups, from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the State's electronic...