Catalog Search Results
1) Wildcard
Author
Language
English
Formats
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
2) Neuromancer
Author
Language
English
Formats
Description
Twenty years ago, it was as if someone turned a light on. The future blazed into existence with each deliberate word that William Gibson laid down. Neuromancer didn’t just explode onto the science fiction scene. It permeated into our consciousness, our culture, our science, and our technology. The winner of the Hugo, Nebula, and Philip K. Dick Awards, Neuromancer showed us what we were capable of creating and what we were capable...
3) Warcross
Author
Language
English
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--
Author
Language
English
Formats
Description
In an unnamed Middle Eastern security state, a young Arab-Indian hacker, who goes by Alif, shields his clients-dissidents, outlaws, revolutionaries, and other watched groups-from surveillance, and tries to stay out of trouble.
The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the state's electronic security force, putting his clients and himself on the line. Then it turns...
Author
Pub. Date
2023.
Language
English
Description
"Young men--tourists--have been disappearing on the islands of Turks and Caicos. The first victim was found in a strange location with both hands cut off; two other visitors vanished without a trace. But, recently, tantalizing leads have emerged and only Tempe can unravel them. Do these attacks have something to do with the islands' culture of gang violence? Tempe isn't so sure. She discovers evidence that what's at stake may actually have global...
9) The bezzle
Author
Pub. Date
2024.
Language
English
Appears on list
Description
When he stumbles upon the ultra-wealthy's newest mark—California's Department of Corrections, Martin Hench, a self-employed forensic accountant, discovers they will stop at nothing to extract money from the government and the hundreds of thousands of prisoners they have at their mercy.
Author
Pub. Date
[2017]
Language
English
Description
Twelve-year-old Max is determined to investigate the connection between a hacker's online attacks of her grandfather and other town officials and suspicious activity at the supposedly haunted Thornwood Manor, even though her grandfather, who is Blue Creek's police chief, wants to keep Max and her souped-up wheelchair out of police business.
11) Dark angel
Author
Language
English
Description
Letty Davenport's actions at a gunfight in Texas draw the attention of the US government. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her partner from the NSA pose as programmers for hire and embark on a road trip to the group's California headquarters. While the two work to make inroads with Ordinary People and uncover...
12) The Sky blues
Author
Pub. Date
[2021]
Language
English
Description
Seventeen-year-old Sky, openly gay but under the radar, decides to make a splashy Promposal but his plans are leaked by an anonymous, homophobic hacker, moving his classmates to help him expose the perpetrator.
Author
Language
English
Formats
Description
"The question of how Donald Trump won the 2016 election looms over his presidency. In particular, were the 78,000 voters who gave him an Electoral College victory affected by the Russian trolls and hackers? Trump had denied it. So too has Vladimir Putin. Others cast the answer as unknowable. Drawing on path-breaking work in which she and her colleagues isolated significant communications effects in the 2000 and 2008 presidential campaigns, the eminent...
14) City spies
Author
Language
English
Formats
Description
"Sara Martinez is facing years in the juvenile detention system for hacking into the foster care computer system to prove that her foster parents are crooks. But then she gets a second chance when a mysterious man offers her a chance to join a group of MI6 affiliated spies"--
Author
Pub. Date
2018.
Language
English
Description
Standing four stories tall in an elegant Bloomsbury terrace, number 4, Euston Square was a well-kept, respectable boarding house, whose tenants felt themselves to be on the rise in Victorian London. But beneath this genteel veneer lay a murderous darkness. For on 9th May 1879, the body of a former resident, Matilda Hacker, was discovered by chance in the coal cellar. The ensuing investigation stripped bare the dark side of Victorian domesticity, revealing...
Author
Pub. Date
2019.
Language
English
Description
Find out how to make IoT devices more secure by learning about the technologies and protocols used and how to implement countermeasures to address vulnerabilities.
The number of IoT (internet of things) devices being deployed is growing exponentially and securing those devices is a huge challenge. In this course, Luciano Ferrari discusses how IoT devices work, including the architectures and protocols used. He covers the main attack surfaces used...
17) Red team blues
Author
Pub. Date
2023.
Language
English
Formats
Description
"New York Times bestseller Cory Doctorow's Red Team Blues is a grabby next-Tuesday thriller about cryptocurrency shenanigans that will awaken you to how the world really works. Martin Hench is 67 years old, single, and successful in a career stretching back to the beginnings of Silicon Valley. He lives and roams California in a very comfortable fully-furnished touring bus, The Unsalted Hash, that he bought years ago from a fading rock star. He knows...
Author
Language
English
Formats
Description
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job. One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website...
Author
Pub. Date
2021.
Language
English
Description
Learn how to meet the most important security challenges when developing websites with PHP.
Hackers target PHP web applications more often than other sites because most PHP code is written by developers with little security experience. Protecting web applications from these attacks has become an essential skill for all PHP developers. PHP: Creating Secure Websites shows you how to meet the most important security challenges when developing websites...
Author
Pub. Date
2019.
Language
English
Description
Protect your networks from cyberattacks. Learn how to implement antivirus protection and firewalls and scan for suspicious activity.
Protect your network from cyberattacks. In this course, Malcolm Shore shows how to use the latest tools to discourage and combat hackers, phishers, and snoops attempting to infiltrate your Windows and Linux systems. Learn what forms cyberattacks can take, as well as the two most common types of protection you can build...
Borrow from another library
Didn't find what you need? Items not owned by Darien Library can be requested from other libraries via our interlibrary loan system (ILL).