Catalog Search Results
Author
Description
Hadfish Systems in London are technological experts - but are they prepared to be caught up in a deadly game of international intelligence? Julian and his business partner, Rami, run Hadfish Systems, a successful software development company. When Rami is offered the chance of a lucrative new contract, he doesn't seem too fussed about where the money is coming from or for what purposes the software might be used.
Julian, though, has concerns, made...
Author
Description
Two years after her husband's death in a bizarre suicide pact between players of an online game, Imogen is still reeling and desperate for answers.
Struggling to cope with her loss and isolation, she is sure that the strange messages she starts receiving are a figment of her imagination. Except that before he died her husband claimed to have had unusual experiences while in the game- experiences where he had been linked to other people, and heard...
Author
Description
Cyber Knights 1.1 is the second part in a stunning two-part collection of stories based on true-life cyber vulnerabilities, by Harold Coyle and Jennifer Ellis
Here be Dragons. In the Age of Discovery, unexplored areas of a map were often marked with this warning. Today, such a warning could easily be applied to the internet. Hackers and cyber assassins present a constant threat to individuals, companies, and institutions.
Protecting these targets...
Author
Description
Dead Reckoning continues the paranormal thriller Dead series. Lethal sniper Kiki Russell and medic Nick Sabino come out of hiding to battle a massive attack on the United States that has plunged it into chaos, beginning the descent into dystopia. With the United States isolated from the world, the government struggles to hold the Union together after the collapse of the economy, the destruction of the electrical grid and a smallpox epidemic that have...
Author
Description
The silicon chip, the soul of today's machines, governs every aspect of our modern society. Dominance in semiconductors equates dominance in the new millennium. But, something has gone wrong. A terrible railway accident in Florida, leaving dozens dead, and countless more injured is traced to faulty computer chips. One-woman figures out that the faulty chips weren't due to negligence, but to sabotage. Erika Conklin was forced to work for the FBI due...
46) China Girl
Author
Description
NEVER AGAIN. A fascist administration rounds up undesirables. Terrorist groups strike governmental and religious targets. The Constitution is under assault. But for the scattered members of INTEL 1, the nightmare is just beginning.
Author
Description
The future... is here. Gregory Simpson brings you "The Quantum Contingent", a globe-trotting, techno-spy thriller with pop-culture references and even its own Spotify playlist! This novel is set in richly detailed locations around the globe and features today's technologies extrapolated for tomorrow, including cryptocurrency, drones, and SpaceX rocket ships.
In 2028, a mysterious group known as The Quantum Contingent has achieved true quantum computing...
Author
Description
Hunted by the top companies in America, Michael Patrick Ryan was offered the world: high starting salaries, stock options, and signing bonuses. Ryan set his sites on SoftCorp, Inc., a company with only one client-the Internal Revenue Service.
But, Mike Ryan has also fallen into the sights of the FBI. Millions of dollars have been smuggled out of the country, and Karen Frost suspects it's someone in the IRS. The deal: federal protection and immunity...
49) Task Lyst
Author
Description
Elliott is a struggling musician who is trying to piece together enough cash every month to keep his dream of performing alive while also paying his rent. That's when he discovered the new app TASK LYST. As a service provider, he sets his own hours, his funds are delivered covertly in bitcoin and the rates continue to grow…but so does his suspicion over the type of tasks that he is being asked to complete. Is the anonymous nature of app-based...
Author
Description
SECRETS HAVE DEADLY CONSEQUENCES, ESPECIALLY IN A DIGITAL WORLD.
What if all things that happen in life-good and evil-are not random or coincidence, but really intentional cyber events? Kevin Albright is relocated to a foreign country, with a new identity. Trapped between the living and the dead, he's a lone wolf left to fight evil global cyber forces, and his past life demons, alone. His unrelenting search for the truth about what really happened...
51) Sabotage
Author
Description
A cruise ship loses power in the North Atlantic. A satellite launches in the South Pacific. Professor Malcolm Clare-celebrated aviator, entrepreneur, and aerospace engineer-disappears from Stanford University and wakes up aboard an unknown jet, minutes before the aircraft plunges into the high seas.
An extortionist code-named "Viking" has seized control of a private warfare technology, pitting a U.S. defense corporation against terrorist conspirators...
52) Tempest Down
Author
Description
An experimental U.S. Submarine, the Tempest D, with a propulsion system five-times-faster than traditional drives is to be tested in the remote South Polar waters. Chinese intelligence learns of the test and sends their own submarine to observe. When an underwater collision causes the submarines to become trapped under the Antarctic ice, they need each other to survive. Meanwhile, a U.S. military team codenamed L.A.S.E.R., Land Air Sea Emergency Rescue,...
53) Deadly Crystal
Author
Description
A cyber-thriller short story
When Chayse's friend is murdered before he can get protective custody, she and her department in Homeland Security are thrust into a race to stop a destructive cyber worm from wiping out all bank and stock market records during the Christmas break. The good news is there is an inoculating code, which will stop the worm. The bad news is it is hidden in a special crystal concealed in the sculpted walls of a beautiful ice...
54) Firewall
Author
Description
The final words that Mortimer Fox whispered to ex CIA agent Bruce Tucker. Cryptic words said in a code coveted the world over, a code that could wipe all the world's powers off the map and trigger Armageddon. The words are understood by a few, but are especially desirable to Vlad Jarkko, Tucker's nemesis from his CIA days. And, when Jarkko snatches Monica Fox, Mortimer's daughter, Tucker must resume the blood feud and find Monica before she capitulates...
Author
Description
On October 28, 1943, a U.S. Navy ship was successfully teleported with disastrous effects on its crew. Crewmen died, developed rare or yet unidentified diseases, and most horrifying of all, some became fused to the metal, their arms and legs protruding from the bulkhead.
A team of psychologists has gathered at a small university to study and analyze the same reoccurring dream of seven completely different people. The dream involves a large navy ship...
56) Madeira
Author
Description
Value Engineer Rave Maps lost a vital business consulting opportunity working on the Portuguese island of Madeira.
Then she nearly lost her life.
Rave's VE skills are tested as she struggles to fulfill client obligations racing from Madeira to Toronto, Paris, Steamboat Springs, and St. Lucia fighting to remain a step ahead of BrainRanger AI, an artificial intelligence working to steal her clients and appropriate everything she knows.
To survive,...
57) Over the Edge
Author
Description
Off-duty United States Secret Service agent H. Hunter Mahoy is wounded while landing a gunfire-stricken jumbo jetliner at Miami International Airport. The surgeon who operates on him finds a suspicious fragment in his left shoulder and queries him as to its origin. Hunter is clueless.
His coworker, Agent Charles Minsk, takes the fragment to a private lab in Washington DC, where he soon learns that it's a highly miniaturized tracking device--or...
Author
Description
It's never quite dark on the Street of Eyes, but the shadows there grow large and deep. You go to find a job. There's no telling if you'll be coming back.
Street is a Science Fiction trilogy set on a future Earth not so different from the one we know. Even in a world bursting with technology, there's still violence, vice, and oppression. Freelance telepath Gina Hart lives this reality every day on the bottom rung of society. Only, for her, it's about...
Author
Description
Donovan Nash has a secret he'll do anything to keep. But he's the prime suspect after someone steals a fifty million dollar executive jet, and FBI agent Veronica Montero put him squarely in the crosshairs. As she digs, she discovers Nash's secret - a revelation that, if made public, would stun the world. Operating on her own agenda, Montero blackmails Nash into helping her hunt down a man she wants dead.
Powerless against the information Montero...
Author
Description
Jay Wilson and Jenni Delacroix are on the run from the mob after narrowly dodging a car bomb, but Kaylee, the new boss, won't stop until they're dead. She has elite hacking skills and digital eyes everywhere, so going off the grid is the only way to survive.
Hiding in the secluded forests of northern Minnesota was retired detective Ted Stone's idea -- he saved them once before, and they're counting on his instincts again. It's a shock when their...
In Interlibrary Loan
Didn't find what you need? Items not owned by Flagstaff City Coconino County Public Library can be requested from other Interlibrary Loan libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request