computer hackers

Type: 
Topical Term
Subfield: 
a
Alias: 
computer hackers

Avenger

2007
Seventeen-year-old Danny, his grandfather, Fergus, who is an ex-SAS explosives expert, and friend Elena set out to stop the evil computer hacker who is sending teenaged suicide bombers to their deaths around the world.

Hacking Timbuktu

a novel
2010
London sixteen-year-old Danny Temple and friend Omar use their computer and parkour skills to elude pursuers as they follow clues in an Arabic manuscript to the mysterious cliffs of Bandiagara in sub-Saharan Africa seeking an ancient treasure.

Hacking

2013
Experts say computer hackers that illegally broke into business and government technology systems in America accessed 3.7 million documents in one year, and the Internet crime complaint center run by the Federal Bureau of Investigation has received 25,000 complaints per month.

Wizzywig

portrait of a serial hacker
2012
Kevin "Boingthump" Phenicle's antics evolve from childhood pranks into the work of an elite hacker who is rumored to be able to get free long distance calls by whistling into pay phones, has caused the first computer virus with a video game piracy scheme, and more.

The art of intrusion

the real stories behind the exploits of hackers, intruders, & deceivers
2005
A collection of more than a dozen true stories about digital hackers, criminals, and terrorists who have used their knowledge of computers to commit crimes.

Hacker cracker

a journey from the mean streets of Brooklyn to the frontiers of cyberspace
2002
The author, raised by an extended family in the Bedford-Stuyvesant neighborhood of Brooklyn, tells the story of how he became involved with computers, and discusses some of his exploits as a hacker before becoming a security specialist for a large financial firm.

Double Digit

2014
"Digit attends MIT, where she hopes to lead a normal life. But Jonas Furnace, the ecoterrorist she foiled before, knows where she is, and he's gunning for her"--Provided by publisher.

Cybercrime

data trails do tell tales
2012
"Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher.

Shantorian

2011
The Trackers, a team of tech-savvy kids, with a cache of wireless surveillance gear and mad coding skills, set out to find Shantorian, the world's most dangerous hacker. Includes a link to a Web site with related videos and clues.

Goldstrike

a thriller
2010
After escaping Camp Twilight, eighteen-year-old Carl Hobbes and Beth, his girlfriend, begin a new life in London, England, where he attempts to program Sphynx Cargo's highly intelligent supercomputer to help protect them from the CIA and assassins.

Pages

Subscribe to RSS - computer hackers