hacking

Type: 
Topical Term
Subfield: 
a
Alias: 
hacking

Hacking for good

"Hackers have found endless ways to break into computer systems. But this isn't always a bad thing. In fact, governments, companies, and schools rely on their own hackers to keep people safe. Learn more about how these experts use computers and coding to hack for good"--Back cover.

Kisses, codes, and conspiracies

2024
"Tan Lee finds himself embroiled in an unusual love triangle, all while trying to defuse a heist, unravel a conspiracy, and navigate the most complicated babysitting assignment ever"--Provided by publisher.
Cover image of Kisses, codes, and conspiracies

Ransom, raids & revenge

2022
Robin and Will Scarlock's band of rebels are enduring a bitterly cold winter in the derelict Sherwood Castle Resort. But when the boss of a major delivery company - the world's second richest man - asks for help to track down the kidnappers of his beloved dogs and offers to pay, Robin finds himself at the centre of the biggest hacking operation of his life.

Fancy Bear goes phishing

the dark history of the information age, in five extraordinary hacks
2023
It?s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society. And because hacking is a human-interest story, he tells the fascinating tales of perpetrators, including Robert Morris Jr., the graduate student who accidentally crashed the internet in the 1980s, and the Bulgarian ?Dark Avenger,? who invented the first mutating computer-virus engine. We also meet a sixteen-year-old from South Boston who took control of Paris Hilton?s cell phone, the Russian intelligence officers who sought to take control of a US election, and others. In telling their stories, Shapiro exposes the hackers? tool kits and gives fresh answers to vital questions: Why is the internet so vulnerable? What can we do in response? Combining the philosophical adventure of G?del, Escher, Bach with dramatic true-crime narrative, the result is a lively and original account of the future of hacking, espionage, and war, and of how to live in an era of cybercrime.
Cover image of Fancy Bear goes phishing

LikeWar

the weaponization of social media
2019
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away"--Provided by publisher.

These deadly games

2022
Soon after receiving an anonymous message stating that she has twenty-four hours to play a game by the sender's rules or he will kill her sister, sixteen-year-old Crystal Donovan realizes that cooperating will destroy her friends' lives and she must figure out a way to beat the kidnapper at his own game before she loses everything.
Cover image of These deadly games

Chaos on CatNet

2021
Steph and her mom settle in Minneapolis where Steph befriends Nell, whose mother and girlfriend are missing, and together with the help of ChesireCat they work to find Nell's missing loved ones and end up uncovering a nefarious AI hacking into social networks and chats to instigate paranoia and violence in the real world.

Cyberterrorism

"Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--Provided by publisher.

Someone we know

2019
Neighbors begin to turn on each other after a series of break-ins is followed by a murder.

Hack attack!

"When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how 'hackers' break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers"--Provided by publisher.

Pages

Subscribe to RSS - hacking