Search:

The girl in the eagle's talons / by Smirnoff, Karin,1964-author.; Death, Sarah,translator.; container of (work):Larsson, Stieg,1954-2004.Millennium trilogy.; translation of:Smirnoff, Karin,1964-Havsörnens skrik.English.;
"Lisbeth Salander returns, in a trailblazing new installment to the best-selling Millennium series. Change is coming to Sweden's far north: its untapped natural resources are sparking a gold rush with the criminal underworld leading the charge. But it's not the prospect of riches that brings Lisbeth Salander to the small town of Gasskas. She has been named guardian to her niece Svala, whose mother has disappeared. Two things soon become clear: Svala is a remarkably gifted teenager-and she's being watched. Mikael Blomkvist is also heading north. He has seen better days. Millennium magazine is in its final print issue, and relations with his daughter are strained. Worse still, there are troubling rumors surrounding the man she's about to marry. When the truth behind the whispers explodes into violence, Salander emerges as Blomkvist's last hope. A pulse-pounding thriller, The Girl in the Eagle's Talons sees Salander and Blomkvist navigating a world of conspiracy and betrayal, old enemies and new friends, ice-bound wilderness and the global corporations that threaten to tear it apart"--
Subjects: Thrillers (Fiction); Novels.; Blomkvist, Mikael (Fictitious character); Salander, Lisbeth (Fictitious character); Betrayal; Conspiracies; Hackers; Journalists; Nieces; Reporters and reporting;
Available copies: 2 / Total copies: 2
unAPI

Game on : tempting twenty-eight / by Evanovich, Janet,author.;
"When Stephanie Plum is woken up in the middle of the night by the sound of footsteps in her apartment, she wishes she didn't keep her gun in the cookie jar in her kitchen. And when she finds out the intruder is fellow apprehension agent Diesel, six feetof hard muscle and bad attitude who she hasn't seen in more than two years, she still thinks the gun might come in handy. Turns out Diesel and Stephanie are on the trail of the same fugitive: Oswald Wednesday, an international computer hacker as brilliant as he is ruthless. Unsure if Diesel is her partner or her competition in this case, she'll need to watch her back every step of the way as she sets the stage to draw Wednesday out from behind his computer and into the real world"--
Subjects: Detective and mystery fiction.; Plum, Stephanie (Fictitious character); Bail bond agents; Bounty hunters; Hackers;
Available copies: 2 / Total copies: 2
unAPI

Game on [sound recording] : tempting twenty-eight / by Evanovich, Janet,author.; King, Lorelei,narrator.; Simon & Schuster Audio (Firm),publisher.;
Read by Lorelei King."When Stephanie Plum is woken up in the middle of the night by the sound of footsteps in her apartment, she wishes she didn't keep her gun in the cookie jar in her kitchen. And when she finds out the intruder is fellow apprehension agent Diesel, six feetof hard muscle and bad attitude who she hasn't seen in more than two years, she still thinks the gun might come in handy. Turns out Diesel and Stephanie are on the trail of the same fugitive: Oswald Wednesday, an international computer hacker as brilliant as he is ruthless. Unsure if Diesel is her partner or her competition in this case, she'll need to watch her back every step of the way as she sets the stage to draw Wednesday out from behind his computer and into the real world"--
Subjects: Audiobooks.; Detective and mystery fiction.; Plum, Stephanie (Fictitious character); Bail bond agents; Bounty hunters; Hackers;
Available copies: 1 / Total copies: 1
unAPI

The girl who played with fire / by Larsson, Stieg,1954-2004.; Keeland, Reg,1943-; Larsson, Stieg,1954-2004.Flickan som lekte med elden.English.;
Subjects: Mystery fiction.; Suspense fiction.; Computer hackers; Human trafficking; Journalists; Murder; Women private investigators; Blomkvist, Mikael (Fictitious character); Salander, Lisbeth (Fictitious character);
© 2009., Viking Canada/Penguin Group,
Available copies: 1 / Total copies: 1
unAPI

Shades of mercy / by Borgos, Bruce,author.;
"In the usually quiet high desert of Nevada, Sheriff Porter Beck faces one of his greatest challenges-a series of unlikely, disturbing and increasingly deadly events of unknown origins. Porter Beck is the sheriff in the high desert of Nevada, doing the same lawman's job his father once did now that he's returned home after decades away. With his twelve person department, they cover a large area that is usually very quiet, but not of late. One childhood friend is the latest to succumb to a new wave of particularly strong illegal opioids, another childhood friend-now an enormously successful rancher-is targeted by a military drone, hacked and commandeered by an unknown source. The hacker is apparently local-local enough to call out Beck by name-and that means they are Beck's problem. Beck's investigation leads him to Mercy Vaughn, the one known hacker in the area. The problem is that she's a teenager, locked up with no computer access at the secure juvenile detention center. But there's something Mercy that doesn't sit quite right with Beck. But when Mercy disappears, Beck understands that she's in danger and time is running out for all of them"--
Subjects: Detective and mystery fiction.; Novels.; Criminal investigation; Drone aircraft; Hackers; Hacking; Missing persons; Murder; Opioids; Sheriffs;
Available copies: 0 / Total copies: 1
unAPI

Dark angel / by Sandford, John,1944 February 23-author.;
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Subjects: Thrillers (Fiction); Novels.; United States. Department of Homeland Security; Betrayal; Computer crimes; Government investigators; Hackers; Undercover operations;
Available copies: 3 / Total copies: 5
unAPI

Clive Cussler's Dark vector : a novel from the NUMA files / by Brown, Graham,1969-author.; Cussler, Clive,creator.;
"A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 2 / Total copies: 2
unAPI

Clive Cussler's Dark vector [sound recording] : a novel from the NUMA files / by Brown, Graham,1969-author.; Brick, Scott,narrator.; Cussler, Clive,creator.; Penguin Audio (Firm),publisher.;
Read by Scott Brick."A freighter carrying top-secret computers of unparalleled capability disappears in the Western Pacific. While searching for a lost treasure that once belonged to the famous Chinese pirate queen, Ching Shih, Kurt Austin and Joe Zavala are redirected to look for the missing vessel. Discovering that the sinking of the ship is just part of an intricate web of deception, they find themselves in the middle of a cyber-war between rival groups of hackers, both of whom want to control the flow of data around the world. With no allies except a group of pirates who operate under their own crude laws, Kurt and Joe must rescue a colleague held hostage--while keeping the computers out of Russian or Chinese hands and the world's digital information safe from the hackers"--
Subjects: Thrillers (Fiction); Audiobooks.; Novels.; Austin, Kurt (Fictitious character); National Underwater and Marine Agency; Cargo ships; Cyberterrorism; Hackers; Marine scientists;
Available copies: 1 / Total copies: 1
unAPI

Dark angel [text (large print)] / by Sandford, John,1944 February 23-author.;
"Letty Davenport, the tough-as-nails adopted daughter of Lucas Davenport, takes on an undercover assignment that brings her across the country and into the crosshairs of a dangerous group of hackers"--
Subjects: Thrillers (Fiction); Large print books.; Novels.; United States. Department of Homeland Security; Betrayal; Computer crimes; Government investigators; Hackers; Undercover operations;
Available copies: 1 / Total copies: 1
unAPI

Anonymous;code [electronic resource]. by Nintendo of America Inc.;
Game.2037. Nakano, Tokyo. Pollon Takaoka is caught up in a tangle of plots as a result of his encounter with the mysterious girl Momo and faces a major event that shakes the world. Play as Pollon and hack the myriad branches of reality and "Load" the ending that saves the world!ESRB Content Rating: M, Mature, 17+ (Violence, blood and gore, suggestive themes, strong language).Cartridge compatible with Nintendo Switch video game system ; HDTV 720p/1080i/1080p ; in game surround sound ; Nintendo Switch Online membership, Nintendo account and internet connection required for online play/features ; Nintendo Switch Pro controller compatible.
Subjects: Nintendo video games.; Role playing video games.; Video games.; Adventure video games.; Fantasy video games.; Nintendo Switch (Video game console); Nintendo Switch video games.; Video games.; Computer games.; Anonymous;code (Game); Hackers; Time travel; Application software; Computer adventure games;
Available copies: 1 / Total copies: 1
unAPI