Catalog Search Results
1) Zero days
Author
Language
English
Description
"Hired by companies to break into buildings and hack security systems, Jacintha "Jack" Cross and her husband, Gabe, are the best penetration specialists in the business. But after a routine assignment goes horribly wrong, Jack arrives home to find her husband dead. To add to her horror, the police are closing in on their suspect--her. Suddenly on the run and quickly running out of options, Jack must decide who she can trust as she circles closer to...
Author
Language
Español
Formats
Description
Del mismo autor de los Bestsellers "El Código Da Vinci" y "Ángeles y demonios," FonoLibro les trae una apasionante novela llena de claves secretas, mensajes ocultos, engaños y crímenes.
"Fortaleza Digital" los mantendrá en suspenso y no podrá dejar de escucharlo hasta que llegue al final. La supercomputadora de la Agencia de Seguridad Nacional se encuentra con un código el cual no puede descifrar. El subdirector de la agencia llama a la hermosa...
3) Hush-hush
Author
Series
Stone Barrington novels volume 56
Language
English
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
5) The sentinel
Author
Series
Jack Reacher novels volume 25
Language
English
Description
"It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the...
6) Follow me
Author
Series
Corrupted hearts volume 1
Pub. Date
[2016]
Language
English
Description
Brilliant, quirky twenty-three-year-old computer prodigy China Mack is totally satisfied with her carefully ordered, data-driven life. But then things start to get a little unpredictable. Jackson Cooper--her company CEO--assigns China to a dangerous and highly classified government defense contractor project. And, her sixteen-year-old runaway niece suddenly arrives in town. And then there's her sexy but oddly unsettling new neighbor, Clark....
Author
Language
English
Appears on list
Formats
Description
"In an unnamed Middle Eastern security state, a young Arab-Indian hacker shields his clients--dissidents, outlaws, Islamists, and other watched groups--from surveillance and tries to stay out of trouble. He goes by Alif, the first letter of the Arabic alphabet, and a convenient handle to hide behind. The aristocratic woman Alif loves has jilted him for a prince chosen by her parents, and his computer has just been breached by the state's electronic...
Author
Pub. Date
2020.
Language
English
Description
"Most days, Masha Maximow was sure she'd chosen the winning side. In her day job as a counterterrorism wizard for an transnational cybersecurity firm, she made the hacks that allowed repressive regimes to spy on dissidents, and manipulate their every move. The perks were fantastic, and the pay was obscene. Just for fun, and to piss off her masters, Masha sometimes used her mad skills to help those same troublemakers evade detection, if their cause...
Author
Pub. Date
©2009
Language
English
Description
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that...
Author
Series
Pub. Date
©2003
Language
English
Description
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who...
Series
Pub. Date
©2005
Language
English
Description
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request