By Brian Falkner
A most sensible Ten YALSA choose for well known Paperbacks for teenagers! Fans of Cory Doctorow's Little Brother and M. T. Anderson's Feed will love this high-octane cyber thriller.
In a dystopian near-future, neuro-headsets have changed computing device keyboards. simply slip on a headset, and it is the net on the pace of concept. For youngster hacker Sam Wilson, a headset is a needs to. yet as he masters the hot expertise, he has a terrifying attention. If something on his laptop is at risk of an assault, what occurs while his brain is associated with the process? may attention itself be hacked?
Brian Falkner, writer of The the next day Code and The Project, can provide an action-packed and thought-provoking sci-fi mystery during which going surfing to a working laptop or computer may possibly suggest the variation among lifestyles and loss of life.
Read or Download Brain Jack PDF
Best action & adventure books
Some distance sooner or later, 60,000 light-years from Earth, a unfastened confederacy of Terran exiles is locked in conflict with the enigmatic Protoss and the ruthless Zerg Swarm, as every one species struggles to make sure its personal survival one of the stars -- conflict that would bring in the start of mankind's maximum bankruptcy or foretell its violent, bloody finish.
Mary Miller had continually been an outcast. As a tender woman she had fallen into the new burn - a torrent of hot chemical run-off from the neighborhood coal mine. Fished out white-haired and half-dead, sympathy for her quick pale whilst the younger guy who driven her in died in a mining twist of fate simply days later.
Jory Rask is a qualified shockball participant. The quickest runback within the video game, she is enjoyed throughout Terra. yet Jory Rask has a mystery that she's lived with for 24 years. In a xenophobic global that despises extraterrestrial beings, she isn't really really human. ..
At the Emerald Isle, stone megaliths protect the outdated methods and the folk who lower back to them. during this cradle of Celtic lore, Kane searches for clues to the fateful enmity that shadows their hopes. yet now not even his fierce will nor Brigid Baptiste's empathy for the traditional methods and Grant's warrior instincts prepares them for an come across with a lady whose old earth magic and otherworld know-how convey them shatteringly with reference to the reality.
- The Electronic Mind Reader (Rick Brant Science Adventure # 12)
- Dragon's Time
- Charlie Bone And The Red Knight
- Down the Long Hills
- The Buried Pyramid (Tor Fantasy)
Extra info for Brain Jack
Skullface grinned evilly. “We’re meeting for dinner. Where the president lives. ” 6 | THE WHITE HOUSE No matter how deep you dug, Sam thought, there always seemed to be a level deeper. The more you knew, the more you realized how little you really knew. The real Neoh@ck Con was held somewhere inside the White House. One of the most secure networks in the entire world. Just the idea that there was a bunch of hackers so powerful, so skillful, that they actually held their meetings within the White House without anyone knowing was mind-blowing!
Names, characters, places, and incidents either are the product of the author’s imagination or are used fictitiously. Any resemblance to actual persons, living or dead, events, or locales is entirely coincidental. Copyright © 2009 by Brian Falkner All rights reserved. , New York. Originally published in paperback in Australia and New Zealand by Walker Books Australia, Newtown, in 2009. Random House and the colophon are registered trademarks of Random House, Inc. Visit us on the Web! com/teachers Library of Congress Cataloging-in-Publication Data Falkner, Brian.
Fargas asked. “Security spider. ” Sam traced the shape of the spider and fed it into his early warning system. The next time the spider, or one of its kind, came crawling in his direction, he would have fair warning. Cracking the network controller was going to be tricky. He briefly considered an ARP poisoning attack against one of the network switches, turning it into a hub and making it accessible to anyone. But that would leave evidence of the hack, which would defeat the whole purpose. He decided on a MAC spoofing attack.