Catalog Search Results
Author
Description
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. If you can take advantage of loopholes -- hacks -- the rules no longer apply to you. Once you learn how to notice hacks, you'll start seeing them everywhere -- and you'll...
Author
Description
Aldrich University is rocked to its core with scandal and intrigue when a hacker dumps 40,000 people's emails--the entire faculty, staff, students, alums--onto an easily searchable database. Affairs and scandals immediately start leaking, but these emails become ticking time bombs that explode when Kit Manning's handsome husband, Dr. Greg Strasser, is murdered. Kit's sister, Willa, flies home to help, returning to a hometown she fled fifteen years...
6) Mind games
Author
Description
"Arden sells memories. Whether it's becoming homecoming queen or studying for that all important test, Arden can hack into a classmate's memories and upload the experience for you just as if you'd lived it yourself. Business is great, right up until the day Arden whites out, losing fifteen minutes of her life and all her memories of the boy across the school yard. The boy her friends assure her she's had a crush on for years. Arden realizes that...
Description
Suzie Pickles, a star on the wane, has her whole life upended when her phone is hacked and a photo of her in an extremely compromising position is released for the whole world to see. This excruciatingly honest show follows the various stages of Suzie's trauma episode by episode, through Shock, Denial, Fear, Shame, Bargaining, Guilt, Anger, and Acceptance as Suzie and her best friend and manager Naomi try to hold her life, career, and marriage together...
Author
Appears on these lists
Description
A young journalist named Jamal Lawson heads to Baltimore to document a rally protesting police brutality after another Black man's death at the hands of police, but things take a turn when the city implements a new safety protocol: the Dome. The Dome turns Baltimore into a highly militarized zone under martial law where no one is allowed in or out. Jamal soon meets a hacker named Marco and Catherine, an AWOL basic training graduate whose parents helped...
Author
Formats
Description
Sammy Wallach has great plans for the end of her junior year: some killer flirting and a few white lies. Sammy thought she had all things covered until the bank her dad works for is attacked by hacktivists. They manage to steal everything in the family's private cloud, including Sammy's entire digital life.
Author
Formats
Description
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
11) Someone we know
Author
Description
"The new domestic suspense novel from NYT bestselling author Shari Lapena. Maybe you don't know your neighbours as well as you thought you did.... 'This is a very difficult letter to write. I hope you will not hate us too much... My son broke into your home recently while you were out.' In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well--learning their secrets, and maybe sharing...
15) Attack surface
Author
Formats
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
16) Hush-hush
Author
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
17) Genius: the con
Author
Description
Three young geniuses from around the globe hatch a plot to trick a vicious warlord, infiltrate a mastermind's organization, protect their families, and save the world.
18) The takeover
Author
Description
On her thirteenth birthday April DaSilva is paying more attention to her social media account than to her friends and family, gathered to celebrate her success in the Broadway show Our Time--but then her account is hacked and replaced, and she realizes some things are more important than social media.
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request