computer hackers

Type: 
Topical Term
Subfield: 
a
Alias: 
computer hackers

Bloody Monday #5

2012
When THIRD-i holds his sister and best friend hostage in relatiation for his attempt to capture Hosho, Fujimara is forced to meet Hosho and Maya's demands to free his loved ones.

Bloody Monday #4

2012
After Fujimaru detains Maya, Third-i is able to question her about the Bloody Monday plot. Meanwhile, Fujimaru is able to decode the two files Ryunosuke gave him and finds a commonality between the current terrorist plot and an incident from two years earlier.

Bloody Monday #3

2011
The more he learns about the Bloody Monday terrorist plot, the more determined Ryunosuke becomes to expose the conspiracy, but more new questions arise than are answered, such as who K is and how Maya fits into the whole thing.

Bloody Monday #2

2011
Fujimaru's investigation into the Bloody Monday data comes to a halt when the terrorists kidnap his sister and demand Falcon complete a hacking job for them in exchange for her safe return. With his sister in dire need of dialysis, Fujimara is desperate to find a way to save his sister quickly, but without assisting the terrorists' plot.

Bloody Monday #11

2013
With the escape of terrorist leader K, Fujimaru and THIRD-i have only five days to prevent "Bloody Monday" from finally arriving courtesy of K's neutron bombs.

Bloody Monday #10

2013
With the death of Shimon Kamijima and the disappearance of J, the threat of terrorism seemed to be over, but a new leader named K has different ideas. Fujimaru must identity and end K's new terrorist plot before it is too late, and along the way he may finally learn the true meaning of "Bloody Monday.".

Espionage

2014
Looks at the techniques spies use to commit treason and steal information, including bugging, radar, spy satellites, and cyberwarfare.

WWW: Wonder

2012
Caitlin Decter, a sixteen-year-old who discovered Webmind, a consciousness that spontaneously emerged from the World Wide Web and has helped humanity, races to protect it from the government after the Pentagon decides it needs to be eliminated.

Olivia twisted

2013
When Olivia, a sixteen-year-old computer whiz and foster child, meets Z, a mysterious guy at her new school, she is brought into his team of hacker elite and begins to engage in criminal activity.

This machine kills secrets

Julian Assange, the Cypherpunks, and their fight to empower whistleblowers
Examines the internet "hacktivist" movement aimed at eliminating the secrets of every government on the planet using a relatively simple software that effortlessly hides the identity of whoever wishes to leak sensitive information. Explores the impact of sites like Wikileaks and figures like Julian Assange and Daniel Domscheit-Berg.

Pages

Subscribe to RSS - computer hackers