hackers

Type: 
Topical Term
Subfield: 
a
Alias: 
hackers

Little brother

Interrogated for days by the Department of Homeland Security in the aftermath of a major terrorist attack on San Francisco, California, seventeen-year-old Marcus is released into what is now a police state, and decides to use his expertise in computer hacking to set things right.

Information technology

Readers will learn about the fields of technology.

Hunting a hacker

using science to crack cybercrime
2023
Today, cybercrime is an enormous problem and one that threatens our future security. But we have two awesome weapons with which to fight it: science and technology. This exciting book explores the work of scientists and crime agencies in their battles to hunt hackers and crack cybercrimes. True-crime stories bring the mysterious world of cybercrime and its technological threats to life in this fascinating read.
Cover image of Hunting a hacker

Misfit

"Finding out your mom is marrying some rich guy you've never met is enough to make any eighteen-year-old's head spin. And for RJ Shaw, it gets worse: he's being sent to Sandover Academy for senior year. If there's one place a misfit hacker like RJ doesn't belong, it's an ivy-covered all-boys boarding school for rich delinquents. There's no point trying to get along with anyone. That is, until he meets Sloane Tresscott in the woods on the outskirts of campus. Gorgeous and sharp-tongued, Sloane is pure temptation"--Amazon.
Cover image of Misfit

City of the dead

2024
When hackers target locations all over London, Kat leads the City Spies in testing security for the British Museum where a secret message leads them to Egypt and the ancient City of the Dead.

Super Max and the mystery of Thornwood's revenge

2018
Twelve-year-old Max is determined to investigate the connection between a hacker's online attacks of her grandfather and other town officials and suspicious activity at the supposedly haunted Thornwood Manor, even though her grandfather, who is Blue Creek's police chief, wants to keep Max and her souped-up wheelchair out of police business.

Hacking

The Art of Exploitation
2008
Presents a guide to computer hacking, including step-by-step information on exploiting sloppy programming, using buffer overflows and format strings, writing code, redirecting network traffic, and cracking encryptions, and contains core techniques and clever tricks to create new hacks and defend against potential attacks. Accompanying LiveCD provides a complete Linux programming and debugging environment.

This mortal coil

"In a world where people are implanted with technology to recode their DNA, gene-hacking genius Cat must decrypt her late father's message concealing a vaccine to a horrifying plague"--Provided by publisher.

Trojan horse

"The US military is under cyberattack. Computer failures have crippled every weapons system. Gizmo and Invisible Six must discover who is behind this attack and the culprits' aim. But the mysterious hackers seem one step ahead of I-6 at every turn, and their use of autonomous weapons keeps I-6 from getting close. Can Gizmo and I-6 stop the worst cyberattack in US military history? Aligned to Common Core Standards and correlated to state standards. Claw is an imprint of Magic Wagon, a division of ABDO."--.

Find me

2014
When teen hacker and foster child Wick Tate finds a dead classmate's diary on her front step, with a note reading "Find me," she sets off on a perverse game of hide-and-seek to catch the killer.

Pages

Subscribe to RSS - hackers