Catalog Search Results
Author
Description
Lisbeth Salander: the girl with the dragon tattoo can be viciously violent. Mikael Bomkvist knows it, and owes his life to it. When a criminologidt and journalist who works with Blomkvist at Millennium Magazine are killed on the brink of publishing a brutal exposé of human trafficking, the evidence points in one direction. Salander's prints are on the murder weapon. But Blomkvist knows Lisbeth would never act without reason, and he cannot find one...
2) Brain Jack
Author
Formats
Description
In a near-future New York City, fourteen-year-old computer genius Sam Wilson manages to hack into the AT&T network and sets off a chain of events that have a profound effect on human activity throughout the world.
Author
Description
Late one night, journalist Mikael Blomkvist receives a phone call from a source claiming to have information vital to the United States. The source has been in contact with a young female superhacker -- a hacker resembling someone Blomkvist knows all too well. The implications are staggering. Blomkvist, in desperate need of a scoop for Millennium, turns to Salander for help. She, as usual, has her own agenda. The secret they are both chasing is at...
Author
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
Description
Hackers around the globe are relentless in their attempts to access networks and devices in order to steal information or plant malicious programs. IT security professionals are in a constant tug-of-war with these actors defending enterprise systems and data from unauthorized access and cyber-attack. In this report Jack Danahy, Director of Advanced Security at IBM, discusses the current enterprise security landscape and offers advice and best practices...
Author
Description
The Sisterhood is on the verge of implosion in "this entertaining installment in [the] remarkably vital series" from the #1 bestselling author (Booklist).
This time, the Sisterhood might be their own worst enemies . . .
Through all their adventures, the bond of the Sisterhood has remained steadfast and unshakeable. But for the first time, the Sisterhood verges on falling apart when...
This time, the Sisterhood might be their own worst enemies . . .
Through all their adventures, the bond of the Sisterhood has remained steadfast and unshakeable. But for the first time, the Sisterhood verges on falling apart when...
7) Dark angel
Author
Appears on list
Description
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more...
Author
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
Author
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
10) Warcross
Author
Appears on list
Description
Teen hacker Emika Chen works as a bounty hunter, tracking down Warcross players who bet on the game illegally. To earn some quick cash, Emika hacks into the game -- only to glitch herself into the action and become an overnight sensation. When Emika gets a call from the game's creator, the young billionaire Hideo Tanaka, he makes her an offer she can't refuse, and suddenly Emika's whisked off to Tokyo into a world of fame and fortune. But the more...
Author
Description
Tracy Whitney finds herself caught in a nefarious and far-reaching scheme involving international terrorism and corruption. Once upon a time, Tracy Whitney was one of the best thieves in the business. Then she settled down, had a baby, and planned to spend the rest of her days quietly, living anonymously, devoted to her son. But tragedy forces her to face her greatest nightmare. Now, with nothing left to protect, she returns to the hunt--and she's...
Author
Description
"From the author of the #1 international best seller The Girl in the Spider's Web: the new book in the Millennium series, which began with Stieg Larsson's The Girl with the Dragon Tattoo Lisbeth Salander, the girl with the dragon tattoo, the brilliant hacker, the obstinate outsider, the volatile seeker of justice for herself and others--even she has never been able to uncover the most telling facts of her traumatic childhood, the secrets that might...
14) First strike
Author
Formats
Description
"The violent terrorist group ISIS has launched a major military campaign to take over Syria. But as they commit more and more public atrocities, their sources for ammunition are drying up. However, their charismatic and tyrannical leader, Tristan Nazir, has a major card left to play, which will get a new secret shipment of arms underway. Dewey Andreas is sent into the field to meet Mallory, the Milan CIA station chief who has explosive proof about...
15) Wildcard
Author
Appears on list
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
Description
In the late 1980s, Melbourne was the hub of the computer underground in Australia, if not the world. The hackers who formed the underground were not disgruntled computer professionals or gangs of organised criminals. They were disaffected teenagers who used their basic home computers to explore the embryonic internet from inside their locked, suburban bedrooms. From this shadowy world emerged two elite hackers known as Electron and Phoenix, who formed...
17) This mortal coil
Author
Formats
Description
"In a world where people are implanted with technology to recode their DNA, gene-hacking genius Cat must decrypt her late father's message concealing a vaccine to a horrifying plague"--
18) Zero days
Author
Description
"Hired by companies to break into buildings and hack security systems, Jack and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to the real killer...
Author
Description
"Full of indelible characters and darkly comic twists, the stories in Kate Folk's debut collection are perfectly pitched for the madness of our modern moment. A ward for a mysterious bone-melting disorder is the scene of a perilous love triangle. A curtain of void obliterates the globe at a steady pace, leaving one woman to decide whom she wants to spend eternity with. A woman navigates finding a partner while beautiful humanoid robots called "blots"...
In Interlibrary Loan
Didn't find what you need? Items not owned by Catamount Library Network can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request