Catalog Search Results
1) Zero days
Author
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jacintha "Jack" Cross and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to...
2) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the...
3) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
Author
Language
English
Formats
Description
"In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients--dissidents, outlaws, Islamists, and other watched groups--from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the state's electronic...
Author
Pub. Date
[2017]
Language
English
Description
"A simple mix up throws one innocent man into the crosshairs of sinister government secrets and ruthless political ambitions in New York Times bestselling author Joseph Finder's timely, electrifying new thriller. Michael Tanner is on his way home from a business trip when he accidentally picks up the wrong MacBook in an airport security line. He doesn't notice the mix-up until he arrives home in Boston, but by then it's too late. Tanner's curiosity...
6) Quantum
Author
Series
Captain Chase novels volume 1
Language
English
Formats
Description
"On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for sabotage, with deadly consequences. As it turns out, the danger is worse than she thought. A spatter of dried blood, a missing security badge, a suspicious...
7) Follow me
Author
Series
Corrupted hearts volume 1
Pub. Date
[2016]
Language
English
Description
Brilliant, quirky twenty-three-year-old computer prodigy China Mack is totally satisfied with her carefully ordered, data-driven life. But then things start to get a little unpredictable. Jackson Cooper--her company CEO--assigns China to a dangerous and highly classified government defense contractor project. And, her sixteen-year-old runaway niece suddenly arrives in town. And then there's her sexy but oddly unsettling new neighbor, Clark....
Author
Pub. Date
2020.
Language
English
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Language
English
Formats
Description
In David Ignatius' s gripping new novel, spies don' t bother to steal information . . . they change it, permanently and invisibly. Graham Weber has been director of the CIA for less than a week when a Swiss kid in a dirty T-shirt walks into the American consulate in Hamburg and says the agency has been hacked, and he has a list of agents' names to prove it. This is the moment a CIA director most dreads. Weber isn' t sure where to turn until he meets...
Series
Pub. Date
©2005
Language
English
Description
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and...
Author
Pub. Date
©2009
Language
English
Description
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that...
Author
Series
Pub. Date
©2003
Language
English
Description
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who...
Series
Language
English
Description
13+ Hours of Video Instruction Designed to help you pass the EC-Council Certified Ethical Hacker (CEH) certification exam. Overview: The Certified Ethical Hacker (CEH) Complete Video Course, 3rd Edition gives you a complete overview of the topics in the EC-Council's updated Certified Ethical Hacker (CEH), V11 exam. This video course has six modules that dive into the key objectives of the exam, providing an in-depth exploration of ethical hacking,...
Pub. Date
[2022]
Language
English
Description
The comprehensive course to perform MITM attacks against connected devices and protect them from all these attacks. About This Video Learn to set up Kali Linux in various environments Learn how to perform Man in the Middle attacks Understand how to hack the connected clients In Detail In this course, you will learn how to set up your Kali Linux 2.0 lab environment properly. In addition to that, you will learn how devices communicate with each other....
Pub. Date
2022.
Language
English
Description
Learn to secure and crack WEP/WPA/WPA2 key and perform MITM attack from scratch using Kali Linux About This Video Detect ARP Poisoning (MITM) attack to protect yourself against it Crack any Wi-Fi encryption using several methods Understand how to hack the connected clients In Detail In this course, you will learn how to set up your Kali Linux lab environment properly. In addition to that, you will learn how devices communicate with each other. Lastly,...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request