Catalog Search Results
1) Version zero
Author
Language
English
Appears on list
Description
"Max, a data whiz at the social media company Wren, has gotten a firsthand glimpse of the dark side of big tech. When he questions what his company does with the data they collect, he's fired...then black-balled across Silicon Valley. With time on his hands and revenge on his mind, Max and his longtime friend (and secretly the love of his life) Akiko, decide to get even by rebooting the internet. After all, in order to fix things, sometimes you have...
2) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Appears on list
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
"Scattered across the world, an elite team of code crackers is working tirelessly to thwart the defining cyber scourge of our time. You've probably never heard of them. But if you work for a school, a business, a hospital, or a municipal government, or simply cherish your digital data, you may be painfully familiar...
Author
Language
English
Description
"A propulsive story of a new breed of investigators who have cracked the Bitcoin blockchain, taking once-anonymous realms of money, drugs, and violence and holding them up to the light Black markets have always thrived in the shadows of society. Increasingly, these enterprises-drug dealing, money laundering, human trafficking, terrorist funding-have found their shadows online. Digital crime lords inhabiting lawless corners of the internet have operated...
Author
Language
English
Formats
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
6) Wildcard
Author
Series
Warcross volume 2
Language
English
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
Emika Chen barely made it out of the Warcross Championships alive. Knowing the truth behind Hideo's new NeuroLink algorithm, she is determined to put a stop to his plans. But someone has put a bounty on Emika's head, and her sole chance for survival lies with Zero and the Blackcoats, his ruthless...
Author
Language
English
Description
Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.
Zero day: a software bug...
Author
Language
English
Description
"This taut, true thriller takes a deep dive into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien"--
"This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition...
9) Dark angel
Author
Series
Letty Davenport novels volume 2
Language
English
Appears on list
Description
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas--and her incredible skills with firearms--draw the attention of several branches of the US government, and make her a perfect fit for even more...
10) The fox
Author
Language
English
Description
Former chief of the British Secret Intelligence Service Adrian Weston is awoken in the middle of the night by a phone call from the prime minister. Her news is shocking: the Pentagon, the NSA, and the CIA have been hacked simultaneously, their seemingly impenetrable firewalls breached by an unknown enemy known only as "The Fox". Even more surprisingly, the culprit is revealed to be a young British teenager, Luke Jennings. He has no agenda, no secrets,...
Author
Language
English
Description
This book is a cyber-crime story that explores the Conficker Computer "Worm," a potentially devastating computer virus that has baffled experts and infected as many as 12 million computers to date. It is about the next frontier in terrorism. When the Conficker computer worm was unleashed on the world in November 2008, cybersecurity experts did not know what to make of it. The worm, exploiting the security flaws in Microsoft Windows, grew at an astonishingly...
12) 1st case
Author
Language
English
Description
"Recruited into the FBI when her unorthodox programming skills get her kicked out of MIT, a computer genius tracks a killer who has been targeting young women through a sophisticated messaging app."--
Angela Hoot's unorthodox programming skills get her kicked out of MIT's graduate school-- and into the FBI's cyber-forensics unit as an intern. There's a messaging app with sophisticated tracking capabilities surfaces. Its beta users, all young women,...
13) Constant fear
Author
Language
English
Description
A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds.
Author
Series
Language
English
Formats
Description
Cybersecurity incidents make the news with startling regularity. Each breach-the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump-makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert...
15) Spooky ballet!
Author
Series
Agent Amelia volume 4
Language
English
Formats
Description
Young Amelia, a secret agent, investigates a class of entranced ballet students, a scarecrow that can control crows, and a librarian whose work on the school library's computers seems to turn students into robots.
Author
Series
Geronimo Stilton. Original series volume 68
Language
English
Formats
Description
After discovering that somone on the Internet has stolen his identity, Geronimo Stilton enlists the help of computer expert Professor Margo Bitmouse to track down the hacker before Geronimo's reputation is ruined.
Author
Language
English
Description
"The crime you'll never see coming. The people you'll never forget. A nineteen-year-old Romanian student stumbles into a criminal ransomware ring in her village. Soon she is extorting Silicon Valley billionaires for millions. A veteran cybersecurity specialist has built a deep network of top-notch hackers in one of the world's largest banks. But then the bank brings in a cadre of ex-military personnel to "help." A cynical Russian only leaves his tiny...
Author
Language
English
Formats
Description
The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.This...
Publisher
Kanopy Streaming
Pub. Date
2014.
Language
English
Description
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and best practices aimed at lowering the risk of a successful attack on enterprise systems and networks. Track:...
Didn't find it?
Didn't find it in the Minuteman Library Network? Request it from other Massachusetts library systems.
Can't find what you are looking for? Recommend it to your local library as a future purchase. Suggest a Purchase