Catalog Search Results
1) Tron: legacy
Formats
Description
"When Flynn, the world's greatest video game creator, sends out a secret signal from an amazing digital realm, his son discovers the clue and embarks on a personal journey to save his long-lost father. With the help of the fearless female warrior Quorra, father and son venture through an incredible cyber universe and wage the ultimate battle of good versus evil."--Container.
Description
Brilliant renegade hacker Mike Cleary and his crack team have finally debugged Guradian, his software program designed to block government cyber snooping, it's going to make them all rich. But as he and his team are targeted and the body count climbs, Cleary discovers that he is at the center of a web of deceit aimed at gaining control of his program at any cost.
Description
Enter the "completely captivating" world of Mr. Robot. Cyber-security engineer by day and vigilante hacker by night, Elliot finds himself at a crossroads when the mysterious leader of an underground hacker group recruits him to destroy the firm he is paid to protect. Compelled by his personal beliefs, Elliot struggles to resist the chance to take down the multinational CEOs he believes are running (and ruining) the world.
Description
Follows a team of thieves, hackers, and con artists who act as modern-day Robin Hoods, standing up for the little guy who has been victimized by the rich and powerful. The team takes on corrupt bankers, high fashion, the tabloid media, and, most shockingly, an old nemesis from their past.
9) The signal
Description
Nic, his girlfriend Haley and his buddy Jonah take a detour from an idyllic cross-country road trip when they are contacted by a mysterious hacker who has gained entry into MIT's most secretive networks. But after a rendezvous in an eerily isolated spot goes awry, Nic wakes to a living nightmare in an isolation unit. Interrogated by Dr. Wallace Damon, Nic soon realizes that the only way to decipher the past is to escape the present.
Description
Winner of the Golden Globe for Best TV Drama, it follows Elliot Alderson, a young cyber-security engineer who becomes involved in the underground hacker group fsociety, after being recruited by their mysterious leader. Following the events of fsociety's 5/9 hack on multi-national company Evil Corp, the second season explores the consequences of that attack as well as the illusion of control.
11) Blackhat
Formats
Description
A furloughed convict and his American and Chinese partners hunt a high-level cybercrime network from Chicago to Los Angeles to Hong Kong to Jakarta.
13) Ratter
Description
Meet Emma, a beautiful young grad student who has just moved from the Midwest to New York, excited to be on her own in the big city. But when a stalker hacks into her devices, he destroys Emma's illusions of privacy and she discovers just how fragile her sense of security can be.
Description
In 2029 a female cybernetic government agent and the Internal Bureau of Investigations are hot on the trail of "The Puppet Master", a mysterious and threatening computer virus capable of infiltrating human hosts. Together, with her fellow agents from Section 9, they embark on a high-tech race against time to capture the omnipresent entity.
Description
"Elliot Anderson [is], a cybersecurity engineer who, along with Mr. Robot and fsociety, starts a revolution to change the world. Season four will pick up where the third season finale left off, delving into the pros and cons of Elliot hitting 'send' on the email that could reverse Five/Nine." --container
16) Hot seat
Description
"The action begins as IT expert Friar finds a hair-trigger bomb strapped to his desk chair. An unseen hacker orders him to steal digital funds online - or have his daughter abducted. As a fearless bomb expert arrives on the scene, the hacker frames Friar as the bomber. The tension mounts as Friar races to clear his name and expose the real terrorist - without getting himself blown to smithereens." --container.
Formats
Description
Forty years ago, Harriet Vanger disappeared from a family gathering on the island owned and inhabited by the powerful Vanger clan. Her body was never found and her beloved uncle is convinced she was murdered and that the killer is a member of his own tightly knit but dysfunctional family. He employs disgraced investigative journalist Mickael Blomkvist and the tattooed and troubled yet resourceful computer hacker Lisbeth Salander to investigate.
19) Swordfish
Description
When the DEA shuts down a dummy corporation operation code named SWORDFISH, they had generated $400 million which they let sit around; years of compound interest has swelled it to $9.5 billion. A covert counter-terrorist unit called Black Cell, headed by Gabriel, wants the money to help finance their war against international terrorism, but it's all locked away behind super-encryption. He brings in convicted hacker Stanley, who only wants to see his...
20) Sneakers
Description
A thriller about five computer hackers with questionable pasts and an equally questionable government job.
Didn't find it?
Can't find what you are looking for? Try our Purchase Suggestion Service. Suggest a Purchase