Catalog Search Results
Author
Series
Millennium novels (Stieg Larsson) volume 2
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 30
Description
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
Author
Accelerated Reader
IL: UG - BL: 6.2 - AR Pts: 33
Description
"In the concluding volume of Stieg Larsson's Millenium trilogy, Lisbeth Salander lies in critical condition in a Swedish hospital, a bullet in her head. But she's fighting for her life in more ways than one: if and when she recovers, she'll stand trial for three murders. With the help of Mikael Blomkvist, she'll need to identify those in authority who have allowed the vulnerable, like herself, to suffer abuse and violence. And, on her own, she'll...
Author
Series
Millennium novels (Stieg Larsson) volume 1
Accelerated Reader
IL: UG - BL: 6.5 - AR Pts: 27
Description
The disappearance forty years ago of Harriet Vanger, a young scion of one of the wealthiest families in Sweden, gnaws at her octogenarian uncle, Henrik Vanger. He is determined to know the truth about what he believes was her murder. He hires crusading journalist Mikael Blomkvist, recently at the wrong end of a libel case, to get to the bottom of Harriet's disappearance. Lisbeth Salander, a twenty-four-year-old, pierced, tattooed genius hacker, possessed...
Author
Series
Accelerated Reader
IL: UG - BL: 5.9 - AR Pts: 17
Formats
Description
After being interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus, released into what is now a police state, decides to use his expertise in computer hacking to set things right.
6) Ghost ship
Author
Series
NUMA files volume 12
Description
When Kurt Austin is injured attempting to rescue the passengers and crew from a sinking yacht, he wakes with fragmented and conflicted memories. Did he see an old friend and her children drown? Or was the yacht abandoned when he came aboard? Determined to know the truth, he soon finds himself descending into a shadowy world of state-sponsored cybercrime, and uncovering a pattern of vanishing scientists, suspicious accidents, and a web of human trafficking....
8) The Fox
Author
Formats
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
9) Neuromancer
Author
Series
Appears on these lists
Formats
Description
The Matrix unfolds like neon origami beneath clusters and constellations of data. Constructs, AIs, live here. Somewhere, concealed by ice, Neuromancer is evolving. As entropy goes into reverse, Molly's surgical implants broadcast trouble from the ferro-concrete geodesic of the Sprawl. Maelcum, Rastafarian in space, is her best hope of rescue. But she and Case, computer cowboy, are busy stealing data from the almighty Megacorps. If the Megacorps do...
Author
Series
Sisterhood series volume 11
Description
A mysterious political operative needs the Sisterhood to track down a computer hacker who stole a list of secret fundraisers' names, but the job proves to be more dangerous than they thought.
Series
Dragon tattoo trilogy volume 1
Pub. Date
2009.
Formats
Description
Forty years after a woman vanishes from a gathering of a powerful and secretive family, a journalist and a computer hacker are asked to solve the mystery of her disappearance.
13) The Devil's Code
Author
Series
Kidd novels volume 3
Formats
Description
Before the chilling Prey novels, Sandford made his mark with computer genius Kidd. Now Kidd is back, but his colleague Jack Morrison is missing, and Kidd himself is being targeted in a national manhunt.
14) The empress file
Author
Series
Kidd novels volume 2
Formats
Description
The ultimate con game thriller from the bestselling master of suspense, featuring the con artist team of Kidd and LuEllen.
Author
Series
Outlaw chronicles volume 3
Description
Seventeen-year-old Nyah Parks is a genius hacker who makes a living by cracking the firewalls of the world's largest corporations. But when the biggest job of her life goes wrong, she's plunged into a desperate situation with only one way out: one last hack that will either save her or kill her.
16) Alif the unseen
Author
Formats
Description
In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients, dissidents, outlaws, Islamists, and other watched groups, from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the State's electronic...
Author
Series
Kidd novels volume 4
Formats
Description
Kidd's friend, Bobby the superhacker, has been murdered. When Kidd goes to Bobby's house to investigate, he finds his battered body, but not his jazzed-up laptop. Now Kidd is doubly disturbed. The murderer is still at large and now has enough secret information to hang a whole lot of people, including Kidd himself. Dodging both the law and other computerheads who want Bobby's information, kidd has to move fast if he is going to survive.
Author
Series
Adventures in extreme reading volume 1
Pub. Date
[2013]
Accelerated Reader
IL: MG - BL: 4.4 - AR Pts: 2
Description
Carter Lewis's Uncle Dan has invented a suit that creates a virtual reality world so that the person experiences and interacts with a book as if he were actually there--but when Carter and his cousin Isabelle put on the suits they discover that a hacker is playing games with them.
19) Don't look now
Author
Series
Accelerated Reader
IL: UG - BL: 5.5 - AR Pts: 13
Description
Noa continues her efforts to protect runaways from the illicit experiments being conducted by a sinister corporation, while hacker Peter struggles to support her and work against the company on behalf of his victimized girlfriend.
20) Streams of Babel
Author
Series
Pub. Date
[2008]
Accelerated Reader
IL: UG - BL: 5.8 - AR Pts: 17
Description
Six teens face a bioterrorist attack on American soil as four are infected with a mysterious disease affecting their small New Jersey neighborhood and two others, both brilliant computer hackers, assist the United States Intelligence Coalition in tracking the perpetrators.