Refine Your Search
Limit Search Result
Collection
  • (7)
  • (5)
  • (4)
  • (3)
  •  
Subject
  • (1)
  • (1)
  • (4)
  • (1)
  •  
Author
  • (1)
  • (1)
  • (1)
  • (1)
  •  
Series
  • (1)
  • (1)
  • (1)
  • (1)
  •  
Publication Date
Target Audience
  • (13)
  • (9)
  • (8)
  • (3)
  •  
Accelerated Reader
Type of Material
  • (28)
  • (9)
  • (1)
  •  
Lexile
Book Adventure
Fountas And Pinnell
Reading Count
Location
  • (20)
  • (6)
  • (3)
  • (2)
  •  
Language
  • (51)
  • (1)
  •  
Library
  • (10)
  • (5)
  • (5)
  • (5)
  •  
Availability
Genre
    Search Results: Returned 52 Results, Displaying Titles 1 - 20
    • share link
      2015., Adolescent, Viking Call No: Sci Fi Fic Ford   Genre: Science Fiction Availability:1 of 1     At Location(s) Summary Note: When his math genius neighbor Ben manages to uncover the key to modern data encryption systems, Robert "Smiles" Smylie comes up with an idea to protect Ben from government agents out to steal the key. But while carrying out his plan, Smiles discovers that his own past may prove the greatest danger to both himself and Ben.
    • share link
      [2015]., Adolescent, Twenty-First Century Books Call No: CRIME & PUNISHMENT NF GIL    Availability:1 of 1     At Location(s) Summary Note: Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.
    • share link
      [2019]., Adolescent, ReferencePoint Press Call No: 364.14 HUL    Availability:1 of 1     At Location(s) Series Title: STEM careers (ReferencePoint Press)Summary Note: "Digital devices such as cell phones, laptops, smart watches, fitness trackers, and more connect the world together and make life more convenient. Many people have become so dependent on digital technology that they could not conduct their business or manage their daily lives without it. They sleep with smart phones by their pillows, as if the device were an extension of the body. The more people rely on technology, however, the more vulnerable they become to data breaches or technology failures"--Provided by publisher.
    • share link
      Juvenile Call No: 005    Availability:2 of 2     At Location(s) Summary Note: The Dark Web is a part of the internet that is hidden and hard to access. It allows users to remain anonymous. Some people use the Dark Web because they fear for their safety. Others use the Dark Web to sell illegal products or services. The Dark Web explores issues in policing the Dark Web. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.
    • share link
      c1998., St. Martin's Griffin Call No: 813 .54    Availability:1 of 1     At Location(s) Summary Note: When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls head cryptographer, Susan Fletcher, a brillant, beautiful, mathematician. What she uncovers sends shock waves through the corridors of power and..
    • share link
      [2016], Pre-adolescent, 45th Parallel Press, an imprint of Cherry Lake Pub. Call No: 005.8    Availability:1 of 1     At Location(s) Summary Note: Provides information on computer hacking and hacking as a career in the security department of a company or government agency.
    • share link
      Call No: 364.16 HAC    Availability:1 of 1     At Location(s) Summary Note: Hackers can break into government websites, nuclear power plants, and the NSA. They can steal corporate secrets, top-secret security code, and credit card numbers. Through social media, they can plant ideas, manipulate public opinion, and influence elections. And there's precious little we can do to stop them. this book documents the dramatic increase in hacking and data mining incidents in recent years. The articles within it explore how these incidents affect world events, such as the United Kingdom's Brexit vote and the 2016 U.S. presidential election. Investigative articles reveal who is behind these incidents, why they happened, and how we can protect our data.
    • share link
      2013., Tor Teen Call No: [Fic]   Edition: 1st ed.    Availability:1 of 1     At Location(s) Summary Note: When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
    • share link
      -- Home land
      Ã2013., Adolescent, Tor Teen, a Tom Doherty Associates book Call No: Science FIC DOC   Edition: 1st trade pbk. ed.    Availability:1 of 1     At Location(s) Summary Note: When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
    • share link
      c2014., ReferencePoint Press Call No: 004.67 8    Availability:1 of 1     At Location(s) Series Title: In controversySummary Note: Integrating facts and a variety of contrasting opinions, this book examines the origins of the Internet privacy controversy, how data collection undermines privacy on the Internet, how hackers use the Internet to violate privacy, and what can be done to limit privacy violation on the Internet.
    • share link
      Juvenile Call No: 005    Availability:1 of 1     At Location(s) Summary Note: Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.