Catalog Search Results
Showing Results using Keyword index
Compare before you buy with unbiased reviews and ratings on thousands of products. Part of EBSCO's MasterFile Elite, find full-text articles from current and past editions of Consumer Reports magazine. Use the search to quickly find what you need!
1) The sentinel
Author
Series
Jack Reacher novels volume 25
Description
When Reacher ends up in a town near Pleasantville, Tennessee, there's nothing pleasant about the place. When he spots someone walking into an ambush, the odds are four against one-- until Reacher intervenes, with his own trademark brand of conflict resolution. The man he saves is Rusty Rutherford, an unassuming IT manager, recently fired after a cyberattack locked up the town's data, records, information... and secrets. Rutherford wants to stay put,...
Author
Series
Formats
Description
"On the trail of a hacker, IT security expert Malachi Touré finds ... a woman from his past he's never gotten over. Dr. Grace Blackwell is no hacker. She's a medical researcher, and someone has stolen a potentially deadly formula from her computer. Despite the still-simmering attraction between them, Mal is wary of trusting her again. Then everything changes when a killer has Grace in their sights ... "--
Author
Formats
Description
A daring, high-tech CIA operation goes wrong and is disowned. Without legal protection, Michael Dunne's only recourse is revenge. CIA operations officer Michael Dunne is tasked with infiltrating an Italian news organization that smells like a front for an enemy intelligence service. It is headed by an American journalist, but the self-styled "people's bandits" run a cyber operation unlike anything the CIA has seen before. Fast, slick and indiscriminate,...
Author
Series
Bromance book club volume 3
Description
Alexis Carlisle and her cat café, ToeBeans, have shot to fame after she came forward as a victim of a celebrity chef's sexual harassment. When a new customer approaches to confide in her, the last thing Alexis expects is for the woman to claim they're sisters. Unsure what to do, Alexis turns to the only man she trusts -- her best friend, Noah Logan. Computer genius Noah left his rebellious teenage hacker past behind to become a computer security...
Author
Description
The presidents new cybersecurity team, Net Force, is up and running. But a political deadlock in Washington makes the young agency dangerously vulnerable to the criminals, terror groups and hostile governments who would use the digital space to advance their destructive goals. In Central Europe, an unknown enemy mounts a crippling high-tech assault against the organizations military threat-response unit on its home base. The strike...
7) The minders
Author
Description
The new high concept thriller from the author of The Passengers and The One, soon to be a Netflix original series. In the 21st century, information is king. But computers can be hacked and files can be broken into--so a unique government initiative has been born. Five ordinary people have been selected to become "minders"--the latest weapon in thwarting cyberterrorism. Transformed by a revolutionary medical procedure, the country's most classified...
8) Hush-hush
Author
Series
Stone Barrington novels volume 56
Description
"Stone Barrington is settling in for some downtime in New York City when an anonymous enemy makes himself known. This nameless foe's threats hit close to home, and before Stone can retaliate, the fearsome messages turn into very real consequences. With the help of old friends--and a lovely new tech-savvy acquaintance--Stone sets out to unravel the fatal agenda. But as the web of adversaries expands, Stone realizes that no place is safe, and he'll...
In Interlibrary Loan
Didn't find what you need? Items not owned by Ajax Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request