Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
61
result(s) for
"Computer hackers Fiction."
Sort by:
Phantom Wheel
by
Deebs, Tracy, author
in
Hackers Juvenile fiction.
,
Computer viruses Juvenile fiction.
,
Friendship in adolescence Juvenile fiction.
2018
\"A group of teenage hackers has been conned into creating the most devastating virus the world has ever seen, and now it's up to them to take down the shadowy corporation behind it before it's too late\"-- Provided by publisher.
How to own an identity
2005
The first two books in this series \"Stealing the Network: How to Own the Box\" and \"Stealing the Network: How to Own a Continent\" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air. \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Burning blue
by
Griffin, Paul, 1966- author
in
Disfigured persons Juvenile fiction.
,
Hackers Juvenile fiction.
,
Beauty, Personal Juvenile fiction.
2014
When Nicole Castro, the most beautiful girl in her wealthy New Jersey high school, is splashed with acid on the left side of her perfect face, the world takes notice. But quiet loner Jay Nazarro does more than that--he decides to find out who did it. Jay understands how it feels to be treated like a freak, and he also has a secret: He's a brilliant hacker. But the deeper he digs, the more danger he's in--and the more he falls for Nicole. Too bad everyone is turning into a suspect, including Nicole herself.
Stealing the Network: How to Own an Identity
2005
The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Warcross
by
Lu, Marie, 1984- author
in
Internet games Juvenile fiction.
,
Computer crimes Juvenile fiction.
,
Hackers Juvenile fiction.
2017
\"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire\"-- Provided by publisher.
Stealing the Network
by
Long, Johnny
,
Mullen, Timothy
,
Russell, Ryan
in
Computer hackers
,
Computer security
,
Cyberterrorism
2007
The final book in the best selling series.
Demo
by
Torres, J., 1969- author
,
Nauck, Todd, illustrator
,
Stucker, Lary, illustrator
in
Superheroes Comic books, strips, etc.
,
Supervillains Comic books, strips, etc.
,
Computer hackers Comic books, strips, etc.
2014
Jinx, Gizmo, and Mammoth, from the HIVE Academy, have hacked into the Titans Tower game system, and the Titans get caught in a virtual reality gone mad.
Stealing the Network
by
Thor
,
Grand, Joe
,
Russell, Ryan
in
Computer hackers
,
Computer security
,
Computer security - Fiction
2004
A fictional continent is emerging as a major new economic, political and military force on the world stage. However, their rapid growth has left little in the way of time and money to sure up their Internet backbone, and it is vulnerable to a potentially catastrophic attack. Who are the bad guys? What do they want?.
Wildcard
by
Lu, Marie, 1984- author
,
Lu, Marie, 1984- Warcross (Series) ;
in
Internet games Juvenile fiction.
,
Computer crimes Juvenile fiction.
,
Hackers Juvenile fiction.
2018
\"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats\"-- Provided by publisher.
Cowboys and the Eternal September
2021
The concept of a hacker originated in the 1970s, and began to gradually take shape in the 1980s. It began to be discussed actively in various contexts, particularly in relation with the rise of open-source operating systems such as GNU and Linux in the 1990s until the early 2000s. Subsequently, as the times changed, the qualities that were demanded of reputable programmers changed in a major way. Originally, the programmers' capabilities in terms of writing code were most important, while their sociability was less emphasized. However, as computers became more common among the general public, and their social impact increased, hackers were required to be more socially amenable in various ways. Therefore, a large number of open-source projects introduced codes of conduct.
Journal Article