Catalog Search Results
Author
Formats
Description
It's not just computers: hacking is everywhere. A hack is any means of subverting a system's rules in unintended ways. Schneier takes hacking out of the world of computing and uses it to analyze the systems that underpin our society: from tax laws to financial markets to politics. If you can take advantage of loopholes -- hacks -- the rules no longer apply to you. Once you learn how to notice hacks, you'll start seeing them everywhere -- and you'll...
Author
Formats
Description
Relates five true stories of hacking from the history of the internet, using these stories to explore how our modern information society works and how the very principles that make computation possible also make hacking possible. Discusses how information is stored in cyberspace and why it is so vulnerable to manipulation and exploitation.
Author
Formats
Description
"Social media has been weaponized, as state hackers and rogue terrorists have seized upon Twitter and Facebook to create chaos and destruction. This urgent report is required reading, from defense expert P.W. Singer and Council on Foreign Relations fellow Emerson Brooking"-- Provided by publisher.
4) Mind games
Author
Description
"Arden sells memories. Whether it's becoming homecoming queen or studying for that all important test, Arden can hack into a classmate's memories and upload the experience for you just as if you'd lived it yourself. Business is great, right up until the day Arden whites out, losing fifteen minutes of her life and all her memories of the boy across the school yard. The boy her friends assure her she's had a crush on for years. Arden realizes that...
Author
Formats
Description
Aldrich University is rocked to its core with scandal and intrigue when a hacker dumps 40,000 people's emails--the entire faculty, staff, students, alums--onto an easily searchable database. Affairs and scandals immediately start leaking, but these emails become ticking time bombs that explode when Kit Manning's handsome husband, Dr. Greg Strasser, is murdered. Kit's sister, Willa, flies home to help, returning to a hometown she fled fifteen years...
Author
Appears on these lists
Formats
Description
A young journalist named Jamal Lawson heads to Baltimore to document a rally protesting police brutality after another Black man's death at the hands of police, but things take a turn when the city implements a new safety protocol: the Dome. The Dome turns Baltimore into a highly militarized zone under martial law where no one is allowed in or out. Jamal soon meets a hacker named Marco and Catherine, an AWOL basic training graduate whose parents helped...
Author
Description
"The new domestic suspense novel from NYT bestselling author Shari Lapena. Maybe you don't know your neighbours as well as you thought you did.... 'This is a very difficult letter to write. I hope you will not hate us too much... My son broke into your home recently while you were out.' In a quiet, leafy suburb in upstate New York, a teenager has been sneaking into houses--and into the owners' computers as well--learning their secrets, and maybe sharing...
Author
Formats
Description
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
Author
Description
Sammy Wallach has great plans for the end of her junior year: some killer flirting and a few white lies. Sammy thought she had all things covered until the bank her dad works for is attacked by hacktivists. They manage to steal everything in the family's private cloud, including Sammy's entire digital life.
12) Attack surface
Author
Formats
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
14) Hush-hush
Author
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
18) The takeover
Author
Description
On her thirteenth birthday April DaSilva is paying more attention to her social media account than to her friends and family, gathered to celebrate her success in the Broadway show Our Time--but then her account is hacked and replaced, and she realizes some things are more important than social media.
19) Chaos on CatNet
Author
Description
Steph and her mom settle in Minneapolis where Steph befriends Nell, whose mother and girlfriend are missing, and together with the help of ChesireCat they work to find Nell's missing loved ones and end up uncovering a nefarious AI hacking into social networks and chats to instigate paranoia and violence in the real world.
In Interlibrary Loan
Didn't find what you need? Items not owned by Nashville can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Suggest a purchase




