computer hackers

Type: 
Topical Term
Subfield: 
a
Alias: 
computer hackers

Hacking and hackers

2014
Contains twenty-one essays in which the authors debate issues related to the topic of hacking.

Adventure time

2014
If they ever want to play video games again, Finn, Jake, and Marceline must figure out how to fix BMO, which has been given a virus by an evil wizard.

Homeland

2014
When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.

Online privacy and social media

2015
Governments, businesses, and individuals all rely extensively on online communication and information but repeated news reports of online breaches do not inspire confidence in the online world. This is true in many areas including social media. What information is collected, how it is used or misused, and how it can be protected are covered in this book.

Hacking and hackers

2014
Contains twenty-one essays in which the authors debate issues related to the topic of hacking.

Computer science and IT

investigating a cyber attack
Looks at the topics of computer and network security through the story of a young professional whose computer is hacked. Includes information on how to keep computers safe, detect and report an attack, and restore an infected computer.

We are Anonymous

inside the hacker world of LulzSec, Anonymous, and the global cyber insurgency
2012
Looks at Anonymous and Lulzsec, groups of hackers and "hacktivists" that brought down major web sites, including VISA, PayPAL, MasterCard, the Church of Scientology, and Sony Entertainment.

Mafiaboy

a portrait of the hacker as a young man
2011
In 2000, an unknown attacker brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. The FBI, police, and independent security experts launched a manhunt as President Clinton convened a cyber security summit to discuss how best to protect America's information infrastructure from future attacks. Then, after hundreds of hours of wiretapping, law enforcement officials executed a late-night raid and came face-to-face with the most wanted man in cyberspace: a fifteen-year-old whose username was "Mafiaboy." Despite requests from every major media outlet, that young man, Michael Calce, has never spoken publicly about his crimes-until now. Equal parts true-crime thriller and expos?, Mafiaboy will take you on an electrifying tour of the fast-evolving twenty-first-century world of hacking-from disruptions caused by teens like Calce to organized crime and other efforts with potentially catastrophic results. It also includes a guide to protecting yourself online.

The Squad

Perfect Cover
2008
High school sophomore Toby Klein enjoys computer hacking and wearing combat boots, so she thinks it is a joke when she is invited to join the cheerleading squad but soon learns cheering is just a cover for an elite group of government operatives known as the squad.

The Squad

Killer Spirit
2008
As if it were not bad enough that sophomore computer hacker Toby Klein has to be a cheerleader to be part of the elite group of government operatives called the Squad, now she is part of the Homecoming court and has agreed to attend the dance with the most popular boy in school.

Pages

Subscribe to RSS - computer hackers