Search:

.hack//. [manga] legend of the twilight / by Hamazaki, Tatsuya.(CARDINAL)478876; Hamazaki, Tatsuya.(CARDINAL)478876;
Subjects: Young adult fiction.;
Available copies: 4 / Total copies: 6
unAPI

.hack//. [manga] legend of the twilight / by Hamazaki, Tatsuya.(CARDINAL)478876; Hamazaki, Tatsuya.(CARDINAL)478876;
Ages 13 and up.
Subjects: Comics (Graphic works); Comic books, strips, etc.; Graphic novels; Science fiction comic books, strips, etc.; Video games; Virtual reality;
Available copies: 3 / Total copies: 4
unAPI

.hack//. [manga] legend of the twilight / by Hamazaki, Tatsuya.(CARDINAL)478876; Izumi, Rei.(CARDINAL)478875;
"Welcome to The World, the most advanced online game ever created. In The World you can be anyone you want to be, act out your adventure fantasies and through teamwork and determination, you can even become a hero. 14-year-old twins Shugo and rena just won a contest that lets them play as legendary .hackers avatars "Kite" and "Black Rose" and now they're ready to take on anything...or so they think. When a high level monster attacks the Level 1 players as soon as they start, the game's administrators know something is wrong in The World. Now Shugo and Rena's real adventure begins as they set forth to solve the mystery of "Twilight" and save The World."--Cover.Rated "T" for teen. Ages 13+.
Subjects: Young adult fiction.; Comics (Graphic works); Graphic novels.; Comic books, strips, etc.; Science fiction comic books, strips, etc.; Video games; Video games; Virtual reality; Virtual reality;
Available copies: 3 / Total copies: 6
unAPI

Hacking / by Beaver, Kevin M.,author.;
pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.Includes bibliographical references and index.
Subjects: Computer security.; Computer networks; Hackers.;
Available copies: 2 / Total copies: 5
unAPI

Hacking / by Covaleski, John.(CARDINAL)400474;
Includes bibliographical references and index.How serious is the threat from hacking? -- Does hacking threaten national security? -- Is hacking justifiable? -- Can hackers be stopped?.Discusses the threat hacking poses to computer securityNC1420L
Subjects: Computer security; Hackers;
Available copies: 1 / Total copies: 2
unAPI

Hacks / by Wren, Christopher S.(Christopher Sale),1936-(CARDINAL)762402;
Subjects: Black humor.; Fiction.; Foreign correspondents;
Available copies: 1 / Total copies: 1
unAPI

Hacked / by Daniel, Ray,1962-author.(CARDINAL)407425;
Promising his cousin that he'll get an apology from an Internet bully, Tucker finds himself in a flame war that goes nuclear after a hacker is murdered. Now more hackers, the whole Twitterverse, and a relentless bounty hunter agree on one thing--Tucker is the killer and he must be stopped.
Subjects: Detective and mystery fiction.; Hackers; Murder;
Available copies: 2 / Total copies: 2
unAPI

Hacked [videorecording]. by Cox, James B.; Robbins, Blake.; Kaufman, Baruch.; Shapiro, Adam.; Burnett, Molly.; Wade, Brian Patrick.; Allo, Andy.; Barclay, Josh.; Aquino, Amy.; O'Connor, Brendan.; Moncrief, Lyn.; Worbeck, Clayton.; Weintraub, Zachary.; Nighthawks Entertainment.; SP Distribution.;
After losing his job to a state-of-the-art supercomputer with cutting edge artificial intelligence capabilities, a disgruntled computer technician decides to put his replacment to the test. Meanwhile, a group of hacker thieves infilitrate the building, intent on stealing the new technology. Amidst the chaos, the supercomputer wakes up and procedes to lockdown the facility with everyone trapped inside. Now, everyone must work together to prevent the artificial intelligence from breaching the facility and wreaking havoc on the outside world.DVD
Subjects: Thriller films.; Feature films.; Supercomputers; Artificial intelligence; Hackers;
Available copies: 1 / Total copies: 1
unAPI

The hack / by Sheed, Wilfrid.(CARDINAL)146989;
Subjects: Fiction.;
Available copies: 1 / Total copies: 1
unAPI

.hack//Alcor [manga] / by Amou, Kanami.(CARDINAL)564776; Izumibara, Rena.(CARDINAL)564731;
Nanase, a player of a popular online game, begins to fall in love with another player in the game, and develops a rivalry with a third player.
Subjects: Comics (Graphic works); Graphic novels.; Young adult fiction.; Comic books, strips, etc.; Fantasy games; Graphic novels; Man-woman relationships; Video games;
Available copies: 1 / Total copies: 1
unAPI