Catalog Search Results
1) Wildcard
Author
Formats
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"-- Provided by publisher.
Emika Chen barely made it out of the Warcross Championships alive. Knowing the truth behind Hideo's new NeuroLink algorithm, she is determined to put a stop to his plans. But someone has put a bounty on Emika's head, and her sole chance for survival lies with Zero and...
Author
Formats
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
3) Warcross
Author
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--Provided by the publisher.
Author
Description
"Cyberbullying among teens happens every day. Harsh words and damaging photos exchanged through texts, email, or social media can result in humiliation, broken friendships, punishment at school, and even legal prosecution. In some cases, online harassment has contributed to suicide. Faced with this frightening problem, parents, educators, and teens are looking for information and advice. But few cyberbullying resources speak to teens themselves. Written...
Author
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Times bestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Author
Description
"Truth is stranger than fiction, in the world of cryptocurrencies. Not so long ago, in June 2016, there was a bug in line 666 of Ethereum's code which enabled $55 million to be stolen in a nanosecond. The remaining $100 million barely escaped the same fate. There's no FDIC for digital currency. This was a nightmare scenario for the entire virtual money and commerce model. Vitalik Buterin, the 20-year-old creator of the program, desperately implemented...
Author
Formats
Description
"Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create online profiles. Contains emergency instructions for those who have been hacked or had their identity, phone, or laptop stolen"-- Provided by publisher.
Author
Formats
Description
Cybercrime leads to a cross-country pursuit as an ambitious, misfit young thief exploits a hacked microchip to rob banks, and learns too late that the wrong people have been watching her. Twenty-six-year-old Ruth excels at microchip design but decides to get rich the old-fashioned way: robbing banks. She becomes a cybercriminal and devotes five years to siphoning more than $250 million out of the banking system using a hacked firewall chip that she...
12) Cyber cop
Author
Formats
Description
Readers will learn what it takes to succeed as a cyber cop. The book also explains the necessary educational steps, useful character traits, potential hazards, and daily job tasks related to this career. Sidebars include thought-provoking trivia. Questions in the backmatter ask for text-dependent analysis. Photos, a glossary, and additional resources are included.
13) The fox
Author
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
14) Zero days
Description
A black ops cyber attack launched by the U.S. and Israel on an Iranian nuclear facility unleashed malware with unforeseen consequences. The Stuxnet virus infiltrated it's pre-determined target only to spread it's infection outward, ultimately exposing systemic vulnerabilities that threatened the very safety of the planet. Delve deep into the bourgeoning world of digital warfare in this documentary thriller from Academy Award winning filmmaker Alex...
15) Dark angel
Author
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas and her incredible skills with firearms draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant partner...
Author
Formats
Description
I am not the kind of mouse who spends money on useless things. But one day I kept getting packages of things I did not order or need. Someone on the Internet had stolen my identity! Professor Margo Bitmouse, a well-known computer expert, helped me track down the hacker. Could I find the thief before my reputation is was ruined?
19) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Formats
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"-- Provided by publisher.
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Suggest a purchase




