Catalog Search Results
Series
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
2) Sneakers
Pub. Date
2003.
Description
When computer expert Martin Bishop and his team of renegade hackers are blackmailed into carrying out a covert operation to recover a mysterious black box, they discover factions from all sides are willing to kill for it.
3) Wargames
Pub. Date
c1983, 2008
Description
Computer hacker David Lightman can bypass the most advanced security systems and break the most intricate secret codes. But when he unwittingly taps into the Defence Department's war computer, he initiates a confrontation of global proportions -- World War III.
Series
Dragon tattoo trilogy volume 1
Pub. Date
2009.
Formats
Description
Forty years after a woman vanishes from a gathering of a powerful and secretive family, a journalist and a computer hacker are asked to solve the mystery of her disappearance.
Series
Dragon tattoo trilogy volume 3
Pub. Date
[2011]
Description
The final installment of Stieg Larsson's 'Millennium' trilogy. Lisbeth Salander is fighting for her life in more ways than one. In an intensive care unit and charged with three murders, she will have to not only prove her innocence, but also identify and denounce the same corruptgovernment institutions that nearly destroyed her life. Once upon a time, she was a victim. Now, Lisbeth Salander is fighting back.
7) Code hunter
Pub. Date
2002
Description
America's best player is being pulled in the ultimate cyber-terror. The game's mastermind has stolen his identity, put him on the FBI's most wanted list, and is blackmailing him to take part in a real twisted plan of world destruction.
Pub. Date
c2003-2004
Description
Major Motoko Kusanagi, the most popular female cyborg in anime history, is back! Together with the rest of the officers of Section 9 and the ever-ready Tachikomas, she will continue her mission to hunt down crime wherever it occurs in both the real and online worlds. Contains 4 episodes.
10) Hackers
Pub. Date
1998
Description
While practicing the tricks of the trade, a neophyte "hacker" accomplishes the nearly impossible: he hacks the highly secured Gibson computer at the Ellingson Mineral Corporation. But in doing so, he unknowingly taps into a high-tech embezzling scheme which is masked by a virus that could cause a horrific environmental disaster. In the flash of a nanosecond, the young hacker and his pals are targeted for the crime by the FBI and Ellingson's deranged...
Pub. Date
[2004]
Description
On the trail of the laughing man! Section 9 has their hands full with the reappearance of the laughing man, a cyber-terrorist who hasn't been heard from in six years. Aramaki believes that the police's prime suspect is a decoy; he orders his team to look into it. Major Motoko Kusanagi, meanwhile, in response to the Laughing Man's latest threat, is guarding the Police Superintendent-General at a press conference. This will mark the beginning of Section...
Pub. Date
c2008
Description
Contains four films about a computer hacker who realizes the world is an elaborate deception created by all-powerful machines of artifical intelligence. In Matrix, in an anti-utopian future, the "real" world is a computer construct, created by an all-powerful artificial intelligence. A small group of humans has found a way out of the construct and is now fighting for the future of the human race. In Matrix reloaded, Neo, Trinity, and Morpheus continue...
13) Tron: legacy
Series
Pub. Date
2011
Description
When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil.
Pub. Date
1998 (English version)
Description
In a world caught in the grip of information overload, Major Kusanagi is an elite officer and heavily modified cybernetic agent. She is on the trail of a computer-criminal who turns people into human marionettes, controlled by computer. She discovers that his true identity lies at the center of a vast and lethal political conspiracy.
Pub. Date
2004, c1995
Description
In 2029 a female cybernetic government agent and the Internal Bureau of Investigations are hot on the trail of "The Puppet Master," a mysterious and threatening computer virus capable of infiltrating human hosts. Together with her fellow agents from Section 9 they embark on a high-tech race against time to capture the omnipresent entity.
17) Pulse
Pub. Date
2006
Description
When their computer hacker friend accidentally channels a mysterious wireless signal, a group of co-eds rally to stop a terrifying evil from taking over the world.
18) Tron
Pub. Date
2002
Description
A hacker is transported into a computer where he must fight for his life against the Master Control system. The hacker teams up with a bookkeeping program and his girlfriend to try to replace Master Control with Tron.
19) The Fifth Estate
Pub. Date
2014
Description
Based on true events, this global thriller takes you behind the headlines. WikiLeaks founder Julian Assange and his colleague Daniel Domscheit-Berg team up to become underground watchdogs of the very powerful. They create a platform that allows whistleblowers to anonymously leak covert data. But when Assange and Berg gain access to the biggest trove of confidential intelligence documents in U.S. history, they battle each other and a defining question...
Series
Pub. Date
2013.
Description
Domestic disturbance: A father discovers that his son's new stepfather is not who he pretends to be -- Face/off: Government agent Sean Archer, whose son was killed in an assassination attempt by Castor Troy, years later assumes Castor's face in order to bring down Troy's terrorist group, while Castor uses the same technique to assume Archer's identity -- The general's daughter: A military investigator is determined to uncover the truth behind a...