Catalog Search Results
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
3) The signal
Description
Nic, his girlfriend Haley and his buddy Jonah take a detour from an idyllic cross-country road trip when they are contacted by a mysterious hacker who has gained entry into MIT's most secretive networks. But after a rendezvous in an eerily isolated spot goes awry, Nic wakes to a living nightmare in an isolation unit. Interrogated by Dr. Wallace Damon, Nic soon realizes that the only way to decipher the past is to escape the present.
4) Swordfish
Description
When the DEA shuts down a dummy corporation operation code named SWORDFISH, they had generated $400 million which they let sit around; years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by Gabriel, wants the money to help finance their war against international terrorism, but it's all locked away behind super-encryption. He brings in convicted hacker Stanley, who only wants to see his...
5) Debug
Description
Deep space. Six young hackers on a grueling work release program attempt to clear out, debug, the computer systems of a massive derelict freighter. They quickly fall prey to the ship's vengeful artificial intelligence, a program that would kill to be human. As the fractious team is forced to match wits with this rogue program, they discover that the ship holds a deadly secret, and a fate far worse than death.
7) Tron
Description
When a brilliant video game maker named Flynn hacks the mainframe of his ex-employer, he is beamed inside an astonishing digital world and becomes part of the very game he is designing.
8) Sneakers
Description
Computer expert Martin Bishop heads a team of renegade hackers who are routinely hired to test security systems. When government agents blackmail the ;sneakers' into carrying out a covert mission of tracking down a top-secret black box, Bishop's team find themselves embroiled in a dangerous operation. They make a stunning discovery; the device has the capability to decode all existing encryption systems around the world.
9) Hot seat
Description
A reformed hacker turned cyber security technician finds himself in the HOT SEAT when he realizes that he's just armed a bomb under his chair and he's forced to help a maniacal anonymous caller pull off an impossible cyber robbery.
Description
Enter the "completely captivating" world of Mr. Robot. Cyber-security engineer by day and vigilante hacker by night, Elliot finds himself at a crossroads when the mysterious leader of an underground hacker group recruits him to destroy the firm he is paid to protect. Compelled by his personal beliefs, Elliot struggles to resist the chance to take down the multinational CEOs he believes are running (and ruining) the world.
Description
A computer hacker penetrates Vatican security and sends an urgent, anonymous plea to The Pope. Handsome Father Quart of the church's Institute of External Affairs, an arm of the Vatican intelligence, is dispatched to investigate. The message of the hacker concerns a crumbling 17th century Baroque church in the heart of Seville that apparently kills to defend itself. As he pursues his investigation, Quart confronts intrigue, mystery, murderers for...
Description
Widescreen. In a world caught in the grip of information overload, Major Kusanagi is an elite officer and heavily modified cybernetic agent. She is on the trail of a computer-criminal who turns people into human marionettes, controlled by computer. She discovers that his true identity lies at the center of a vast and lethal political conspiracy.
15) Wargames
Appears on list
Description
Young computer genius David Lightman breaks into the Defense Department's war computer, but what he thinks is a game just may start World War III.
Description
The final installment of Stieg Larsson's 'Millennium' trilogy. Lisbeth Salander is fighting for her life in more ways than one. In an intensive care unit and charged with three murders, she will have to not only prove her innocence, but also identify and denounce the same corrupt government institutions that nearly destroyed her life. Once upon a time, she was a victim. Now, Lisbeth Salander is fighting back.
18) Blackhat
Description
A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta.
Description
"Gear up for explosive action and mind-blowing adventure when Hydra's ancient origins and ultimate agenda are revealed in the epic, game-changing third season of Marvel's Agents of S.H.I.E.L.D. The survival of mankind hangs in the balance as Director Phil Coulson and his Agents battle an otherworldly evil. Devastated by the apparent loss of Jemma Simmons, Leo Fitz risks everything to rescue her. Agent May rejoins the team--only to discover a terrible...
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Suggest a purchase

