Catalog Search Results
1) Dark angel
Author
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas and her incredible skills with firearms draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant partner...
2) Wildcard
Author
Appears on list
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
Emika Chen barely made it out of the Warcross Championships alive. Knowing the truth behind Hideo's new NeuroLink algorithm, she is determined to put a stop to his plans. But someone has put a bounty on Emika's head, and her sole chance for survival lies with Zero and the Blackcoats, his ruthless...
3) Warcross
Author
Appears on list
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--Provided by the publisher.
4) Zero days
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
Author
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
6) Hot seat
Description
A reformed hacker turned cyber security technician finds himself in the HOT SEAT when he realizes that he's just armed a bomb under his chair and he's forced to help a maniacal anonymous caller pull off an impossible cyber robbery.
Author
Description
Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump-makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert...
Author
Description
When the lights go out one night, no one panics. Not yet. The lights always come back on soon, don't they? Surely it's a glitch, a storm, a malfunction. But something seems strange about this night. Across Europe, controllers watch in disbelief as electrical grids collapse. There is no power, anywhere. A former hacker and activist, Piero investigates a possible cause of the disaster. The authorities don't believe him, and he soon becomes a prime suspect...
Author
Description
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day....
12) Constant fear
Author
Formats
Description
A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds.
When a drunk-driving accident ruined his life, only a popular survivalist blog helped to restore Jake's sense of control. He's become an avid Doomsday Prepper, raising his diabetic son, Andy, to be ready for any sudden catastrophe. Jake works as a custodian at isolated Pepperell Academy...
13) The fox
Author
Appears on list
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Formats
Description
"Cyberbullying among teens happens every day. Harsh words and damaging photos exchanged through texts, email, or social media can result in humiliation, broken friendships, punishment at school, and even legal prosecution. In some cases, online harassment has contributed to suicide. Faced with this frightening problem, parents, educators, and teens are looking for information and advice. But few cyberbullying resources speak to teens themselves. Written...
16) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
17) Financial crime
Author
Description
"Truth is stranger than fiction, in the world of cryptocurrencies. Not so long ago, in June 2016, there was a bug in line 666 of Ethereum's code which enabled $55 million to be stolen in a nanosecond. The remaining $100 million barely escaped the same fate. There's no FDIC for digital currency. This was a nightmare scenario for the entire virtual money and commerce model. Vitalik Buterin, the 20-year-old creator of the program, desperately implemented...
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request