Advertisement
the hacker series: Hard Limit Meredith Wild, 2015-04-07 Blake Landon is a man who has everything-wealth, good looks, and the love of Erica Hathaway. The power couple has been through hell and back, and when life has torn them apart, somehow they have always found their way back to each other, more in love and stronger than ever. Erica has never been more ready to say I do. On the verge of making the ultimate commitment, she uncovers an unsettling chapter of Blake's history. As she makes peace with her own past and the family who left her behind, she presses Blake to tear down the last walls between them. Determined to know the man he once was, she opens a door to a world beyond her wildest imagination-a world that has her questioning the limits of her own desires. As danger lurks and dark secrets come to light, will the past destroy their promise of forever? |
the hacker series: Hardpressed Meredith Wild, 2015-04-07 In Hardpressed, the highly anticipated second book of the Hacker Series that began with Hardwired, Blake and Erica face threats that put both their love and their lives on the line. Despite Blake Landon's controlling ways, the young and wealthy hacker finally won the trust of the woman he loves. Internet entrepreneur Erica Hathaway broke down the walls that kept her from opening her heart and her business to Blake. Ready to start this new chapter in her life, Erica is determined not to let anything come between them, even if that means giving Blake back some of the control he craves in and out of the bedroom. But when demons from her past threaten their future, Erica makes a decision that could change their lives forever. |
the hacker series: Hard Love Meredith Wild, 2015 It all comes down to this... Don't miss the riveting conclusion to Blake and Erica's story by #1 New York Times bestselling Meredith Wild.Meredith Wild is one author who pulls me in on the first page and keeps me enthralled till the last.This is one series I can't get enough of. 0́4Sizzling Pages Romance ReviewsMore in the Hacker series:HARDWIREDHARDPRESSEDHARDLINEHARD LIMIT |
the hacker series: Hardline Meredith Wild, 2015-04-07 Software mogul Blake Landon has met his match in headstrong Erica Hathaway. While his controlling nature and her independent spirit continue to battle, Blake has no intention of letting her out of his life again. Erica has given Blake her trust and her love, determined that they will conquer any challenges together. But when he demands more and tests the boundaries of her commitment, she is forced to face the dark desires he's kept hidden. As their bonds grow tighter, their enemies close in. With Erica's start-up in danger, Blake's frustration grows as he tries to protect her from those who would ruin her only to get to him. Can their relationship survive when Blake's enemies cross the line and threaten more than her livelihood? |
the hacker series: Hard Love Meredith Wild, 2015-09-15 Days after their wedding, Blake and Erica Landon embark on their honeymoon-a journey that deepens their bond and promises to fade the scars of their past. Just when their troubles seem safely behind them, a scandal threatens their new-found peace. Back home, Blake finds himself at the centre of the controversy, haunted by the transgressions of his hacker past that he has no wish to relive. With Blake's freedom at stake and their future in peril, Erica will stop at nothing to clear his name. But when Blake defies the authorities and refuses to seek the truth, their world gradually begins to crumble. Will he let his past win? Or can Erica convince him that their life together is worth fighting for-now more than ever... The perfect new addiction for fans of Fifty Shades of Grey and Sylvia Day's Bared To You series. |
the hacker series: Breaking and Entering Jeremy N. Smith, 2019 This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker--a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of high-risk physical trespassing: the original hacking. Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons--and the trespassing and social engineering talents she had developed while hacking at MIT. The company tested its clients' security by every means possible--not just coding, but donning disguises and sneaking past guards and secretaries into the C-suite. Alien now runs a boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions--banks, retailers, government agencies. Her work combines devilish charm, old-school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character-driven, fast-paced treatment it deserves. |
the hacker series: The Hacker Anna Hackett, 2021-10-08 She's accidentally pregnant and someone is trying to kill her...and now her one-night-stand is her fierce protector. Helicopter pilot Maggie Lopez is focused on building her helicopter and drone photography business-and she has the loans to prove it. She takes one night off to trade her jeans for a designer dress, and attend a fancy gala...and ends up spending a very steamy night with her panty-melting crush-Ace Oliveira. He's tall, sexy, and the guru of all things tech at Norcross Security. She wasn't supposed to fall in lust, or fall in love, and she really wasn't supposed to fall pregnant. Ace Oliveira's life is just how he likes it. After years protecting his country at the NSA, he now puts his special computer and hacking skills to good use at Norcross Security. He gets paid well. Has good friends. Enjoys the hell out of his carefree bachelor lifestyle. Relationships and kids are not on the cards for him-ever. He has his reasons. But then feisty, saucy Maggie-who snuck out of his bed like a thief-drops a bombshell. Before they can even process the surprise pregnancy, it becomes clear someone is trying to kill Maggie. A series of deadly accidents are all centered on her, and Ace will do whatever it takes to keep her safe. With the men of Norcross at his side, he'll track down a killer, fight his own demons, and convince skittish, independent Maggie to fall in love with her baby's daddy. ***Each book in this action-packed romance series can be read as a standalone. |
the hacker series: Advanced Penetration Testing Wil Allsopp, 2017-03-20 Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data—even from organizations without a direct Internet connection—this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level—and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks. |
the hacker series: The Hacker's Key Jon Skovron, 2020-09-01 A thrilling cyber-doomsday action/adventure novel that's Ally Carter meets GAMER ARMY. Ada Genet's father, Remy Genet, was one of the most infamous criminals in the world, specializing in infiltration, theft, and cybercrime. As far back as she can remember, Ada had been his accomplice. She helped him steal secrets from governments, weapons from terrorists, and money from just about everyone. But when the law finally caught up with them, Remy ended up in prison -- and Ada at a military boarding school, as a ward of the US Government. Now something called the Hacker's Key has been stolen from a secret UN installation. The Key could supposedly shut down every computer, smartphone, and internet-connected device simultaneously, causing mass chaos around the world. A Techno-Doomsday. A clue left behind at the scene points to Ada's father, but he's been in prison the whole time. Then Remy springs one last surprise. He'll speak, but only to one person -- his daughter, Ada. |
the hacker series: The Hacker's Handbook Susan Young, Dave Aitel, 2003-11-24 This handbook reveals those aspects of hacking least understood by network administrators. It analyzes subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific components and tasks, providing theoretical background that prepares network defenders for the always-changing tools and techniques of intruders. Part I introduces programming, protocol, and attack concepts. Part II addresses subject areas (protocols, services, technologies, etc.) that may be vulnerable. Part III details consolidation activities that hackers may use following penetration. |
the hacker series: The Strain Guillermo Del Toro, Chuck Hogan, 2010-06-29 In one week, Manhattan will be gone. In one month, the country. In two months . . . the world. At New York's JFK Airport an arriving Boeing 777 taxiing along a runway suddenly stops dead. All the shades have been drawn, all communication channels have mysteriously gone quiet. Dr. Eph Goodweather, head of a CDC rapid-response team investigating biological threats, boards the darkened plane . . . and what he finds makes his blood run cold. A terrifying contagion has come to the unsuspecting city, an unstoppable plague that will spread like an all-consuming wildfire—lethal, merciless, hungry . . . vampiric. And in a pawnshop in Spanish Harlem an aged Holocaust survivor knows that the war he has been dreading his entire life is finally here . . . |
the hacker series: OtherEarth Jason Segel, Kirsten Miller, 2019-10-01 Return to the series BuzzFeed compared to Ready Player One! The second book in the fast-paced trilogy from New York Times bestselling authors Jason Segel and Kirsten Miller is perfect for fans of HBO's Westworld. Simon would have done anything to save his best friend after a mysterious accident almost killed her--including follow her into a virtual world. And what he and Kat discovered there was more terrifying than anything they could have ever imagined. The world's largest tech corporation, the Company, is using unwitting hospital patients to test a device that lets VR be experienced with all five senses. The technology is so advanced that it's deadly. Now the Company is hunting Simon and Kat while war rages in Otherworld, the virtual world it created. Determined to destroy the coporation, Simon and Kat must join forces with a hacker, a gangster, and a digital entity. But as they battle to save two worlds, they uncover an all-new threat to our world: the Company's latest creation, an augmented-reality game called OtherEarth. Not only does OtherEarth kill, it has the power to erase the line between what's real and what's fantasy. Praise for the Last Reality series: A New York Times bestseller A potent commentary on how much we're willing to give up to the lure of technology. --EW.com Full of high stakes, thrillers, and fantastic twists and turns, fans of Ready Player One are sure to love this addictive read. --BuzzFeed An engaging VR cautionary tale. --The A.V. Club A fantastic journey from start to finish. --Hypable |
the hacker series: Code Name: Hacker Sawyer Bennett, 2020-03-31 I’m not the same Bebe Grimshaw I was years ago. The woman I was spent years behind the bars of the highest security women’s prison in the nation, my punishment for hacking nuclear codes as part of a crime syndicate I’d gotten in way too deep with. The woman I am today doesn’t regret what I did, or the fact that I got caught, but I am remorseful for the years I lost with my son, Aaron. Released from my sentence early thanks to Kynan McGrath, I joined his team at Jameson Force Security and now put my skills to use helping people. I’m just trying to get back a piece of what I lost, focusing solely on raising Aaron and my work at Jameson. As long as I have my son and my career, I’m content. But life has a funny way of letting you know exactly what you need, and when a devastatingly handsome stranger named Griffin befriends Aaron at the park, I have to consider I might be missing something. A part of me that was locked away long ago reawakens, and I find myself looking at Griff in a way I’ve not looked at a man in more than a decade. Just when I think things are starting to look up, my world is turned upside down. Turns out that meeting wasn’t an accident, and things aren’t going my way at all. Griffin Moore is the man sent here to kill me. |
the hacker series: The Hacker and the State Ben Buchanan, 2020-02-25 The threat of cyberwar can feel very Hollywood: nuclear codes hacked, power plants melting down, cities burning. In reality, state-sponsored hacking is covert, insidious, and constant. It is also much harder to prevent. Ben Buchanan reveals the cyberwar that’s already here, reshaping the global contest for geopolitical advantage. |
the hacker series: Blood of Zeus Meredith Wild, Angel Payne, 2020-08-25 An ancient grudge. A forbidden love. The only thing worse than being a demon is being a Valari. As an undergraduate at Los Angeles’s Alameda University, Kara Valari can sometimes succeed at forgetting she’s both. Lost between the pages of the classics and tucked into the shadows of lecture halls, she can dodge the paparazzi’s lenses as well as her family’s publicized dramas—not to mention their private expectations. She has one more year to feed her true passions. Then she’ll be expected to fulfill a much darker destiny. Cursed with inexplicable strength and godlike stature, literature professor Maximus Kane knows all about darkness. Every day he’s reminded of the missteps of his childhood and the devastating consequences they’ve had on those dearest to him. To atone, Maximus spends his nights alone and his days submerged in the quiet life of academia. His existence has become a study in control, and he’s become a master at it—until Kara Valari walks into his toughest course. Viscerally, Kara’s everything he craves. Logically, she’s everything he rejects. She’s a starlet of privilege. She’s also a student. And after one touch, he can’t deny that she’s awakened something in him that may never go dormant. Nothing about her makes sense, but everything about her feels right. Especially in the deepest strands of his DNA, which are still shadows of mystery to him—a mystery Kara seems determined to uncover. She’s Hollywood royalty. She’s forbidden fruit. And he’s pretty sure she could be the answer to everything. |
the hacker series: Bad Monkey Carl Hiaasen, 2013-06-11 Coming as an Apple Original series from Ted Lasso Executive Producer Bill Lawrence and starring Vince Vaughn • A wickedly funny novel from the New York Times bestselling author of Squeeze Me in which the greedy, the corrupt, and the degraders of what’s left of pristine Florida—now, of the Bahamas as well—get their comeuppance. “[A] comedic marvel … [Hiaasen] hasn’t written a novel this funny since Skinny Dip.”—The New York Times Andrew Yancy—late of the Miami Police and soon-to-be-late of the Monroe County sheriff’s office—has a human arm in his freezer. There’s a logical (Hiaasenian) explanation for that, but not for how and why it parted from its shadowy owner. Yancy thinks the boating-accident/shark-luncheon explanation is full of holes, and if he can prove murder, the sheriff might rescue him from his grisly Health Inspector gig (it’s not called the roach patrol for nothing). But first—this being Hiaasen country—Yancy must negotiate an obstacle course of wildly unpredictable events with a crew of even more wildly unpredictable characters, including his just-ex lover, a hot-blooded fugitive from Kansas; the twitchy widow of the frozen arm; two avariciously optimistic real-estate speculators; the Bahamian voodoo witch known as the Dragon Queen, whose suitors are blinded unto death by her peculiar charms; Yancy’s new true love, a kinky coroner; and the eponymous bad monkey, who with hilarious aplomb earns his place among Carl Hiaasen’s greatest characters. |
the hacker series: Insider Attack and Cyber Security Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair, Sean W. Smith, 2008-08-29 Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and includes the following topics: critical IT infrastructure, insider threats, awareness and dealing with nefarious human activities in a manner that respects individual liberties and privacy policies of organizations while providing the best protection of critical resources and services. In some sense, the insider problem is the ultimate security problem. This volume concludes with technical and legal challenges facing researchers who study and propose solutions to mitigate insider attacks. |
the hacker series: American King SIERRA. SIMONE, 2024-11-26 From USA Today and Wall Street Journal bestselling author Sierra Simone comes the final installment in a steamy polyamorous romance trilogy with a dash of politics and a pinch of magic. His name is Maxen Ashley Colchester, and he swore a duty to his country. Then, he swore his heart to them. They say that every tragic hero has a fatal flaw, a secret sin, a tiny extra stitch sewn into his future since birth. And here Ash is, President of the United States, a king who was foolish enough to build his kingdom on the bones of the past. His sins are no longer secret. His flaws have never been more fatal. And he's never been closer to tragedy than he is now. After losing Embry, their vice president, their prince, Ash and First Lady Greer must not only run for re-election without the man they love, but against him. Yet even political rivalry and the threat of war cannot unravel the years of fire and longing that tie the three of them together, no matter what that bond might cost them. Their country, their careers, their lives--it's all at risk now. Ash knows love was always meant to be the end of their story: his, Embry's, and Greer's. He just hadn't realized it might be the end of them, too. Long live the king. |
the hacker series: Hacker Ted Dekker, 2014-06-10 “My name is Nyah and I’m a hacker. I know things most people would never believe. Things that shouldn’t exist, but do.” |
the hacker series: Tom Clancy's Net Force Tom Clancy, Mel Odom, Steve R. Pieczenik, Steve Pieczenik, 2001 Created by Tom Clancy and Steve Pieczenik, the Net Force Explorers continue their fight against high-tech crime. In this installment, Explorer Andy Moore is enlisted to program virtual animals for the Cservanka Brothers Circus. But underneath the big top, a dark side emerges. And the only thing Andy finds in the cyber-circus is a black market ring -- in high tech weapons software and hardware. |
the hacker series: Top 8 (The Top 8 Trilogy, Book 1) Katie Finn, 2010-10-01 Social networking sites are THE place to be for today's teens -- this fun, juicy novel explores the ups, downs, and scandals of a group of friends online!Madison MacDonald is seriously freaking outMadison MacDonald16Putnam, CTStatus: Single?About Me:Everything in my life was working out. I had my three best friends, a brand-new boyfriend, and the lead in the school play. Aside from that history paper I hadn't started, things felt perfect.Then I returned from spring break to find my Friendverse profile hacked. Someone clearly out to ruin me had spilled the most damaging secrets - AND posted the worst photos of me ever taken - online. |
the hacker series: The Hacker Playbook Peter Kim, 2014 Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library—so there's no reason not to get in the game. |
the hacker series: Into the Fire Meredith Wild, 2024-11-12 “The ultra-sexy second book in Meredith Wild’s Bridge series will hook both fans of the series and newcomers...This steamy modern romance had us fanning ourselves.” ~Apple Books Editors’ Notes Darren Bridge is living a bachelor’s dream. When he’s not running into burning buildings with his crew, he’s training the flavor of the week at his brother’s gym. Few women have ever been off limits...until Vanessa. Smart, beautiful, and legs for days, she’s unlike anyone he’s ever met. Too bad he’s sworn to leave her alone. Overworked with no end in sight, Vanessa Hawkins hasn’t had a vacation in two years. When Cameron and Maya’s destination wedding takes her out of the office for a much-needed break, she finds herself struggling to resist her attraction to the best man. Darren is dangerously good-looking with enough charm to make any hot-blooded woman want to drop her panties and enjoy the ride, no matter how long it lasts. When they return to the city, Darren realizes the single life has lost its glimmer. But with everything else on her plate, Vanessa doesn’t have room in her life for a man, let alone a player. Can Darren find his way into her heart and convince her that he’s worth the risk? |
the hacker series: How to Hack a Hacker Aj Sherwood, 2020-07-29 Staying away is Kyou's number one rule when it comes to protecting the sexy real-estate developer.Kyou has a routine. A system. He guards Brannigan Genovese, hacks for his family of choice, and drinks far too much caffeine for any living being. Only a few things can completely disrupt his routine to cause him trouble: -Brannigan buying up real estate from the Irish Mob-Kyou's band of brothers figuring out who Brannigan actually is-Ivan-Feelings for one Brannigan Genovese Oddly enough, it's the feelings that get Kyou in the most trouble. Because when Brannigan is in danger, Kyou ignores all his brain's protestations and breaks every rule he has to save the man, including his number one. And damn the consequences. Tags: It's not stalking (totally stalking), sleep is for the weak, coffee IS food, running-from-the-mob meet cute, Brannigan does stupid stuff to make Kyou call him, Kyou is utterly done, pansexual character, band of brothers, anxiety, family of choice, emotional growth, so simple a ten-year-old can do it, no really it's not that hard, Kyou peopled last week, meddling, so much meddling, Irish Mobsters were hurt in the making of this book, Ivan's actually serious for once, yes the world almost ended |
the hacker series: Terminal Shock Franklin W. Dixon, 1990 When a young computer expert and friend of Frank Hardy is poisoned, Frank and Joe access his computer to find the answers. |
the hacker series: On My Knees Meredith Wild, 2024-11-12 The writing flows like music, beautifully written. With characters that feel so real you won't want to put this book away when you are finished. --Books and Beyond Fifty Shades Haunted by the responsibility of caring for her troubled family, Maya Jacobs gave the only answer she could when Cameron asked her to marry him. Years later, entrenched in a soulless professional routine, she distracts herself from the lingering regret of her decision with a “work hard, play hard” lifestyle that guarantees no man will ever find his way into her heart again. Cameron Bridge has spent the past five years married to the military, trying to escape the painful memory of losing Maya. After fighting his own war in the desert, he starts a new life in New York City, with his siblings, Olivia and Darren, by his side. When fate brings Maya back to him in the heart of a city filled with its own hopes and shadows, can Cameron find the girl he once loved in the woman she’s become? |
the hacker series: Hardwired Walter Jon Williams, 2006-10-01 ears ago, the last desperate hopes of Earth were crushed as corporate Orbital blocs ruling from on high devastated the planet's face. Today, the autocratic Orbitals indulge in decadent luxury far above the mudboys, dirtgirls, zonedancers, and buttonheads who live out violent lives of electronic distraction and dependence amid the flooded, ruined cities and teeming slums of a balkanized America. But there are heroes; those who would stand against the Orbital powers and keep freedom's cause alive. Two such heroes are the metal-eyed ex-fighter pilot turned panzer-driver Cowboy, and Sarah, the cybernetic assassin desperate to find a better life for her drug-addicted brother. Together, Cowboy and Sarah embark on a high-octane odyssey across the shattered face of the American west. From Walter Jon Williams comes Hardwired, the hard-hitting, seminal classic that feels as prescient today as when it was first published. Like a steel-guitar fueled Damnation Alley, as directed by Sam Peckinpah, Hardwired demonstrates how Williams's singular vision helped defined the cyberpunk genre. Skyhorse Publishing, under our Night Shade and Talos imprints, is proud to publish a broad range of titles for readers interested in science fiction (space opera, time travel, hard SF, alien invasion, near-future dystopia), fantasy (grimdark, sword and sorcery, contemporary urban fantasy, steampunk, alternative history), and horror (zombies, vampires, and the occult and supernatural), and much more. While not every title we publish becomes a New York Times bestseller, a national bestseller, or a Hugo or Nebula award-winner, we are committed to publishing quality books from a diverse group of authors. |
the hacker series: The Exphoria Code Antony Johnston, 2017-11-16 The first book in a major new techno-thriller series featuring cyber-espionage specialist Brigitte Sharp. 'Very possibly the definitive espionage thriller of the early 21st century' – Alan Moore 'Antony Johnston is a talent to look out for and this, his latest entry into the world of espionage, is a treat' – Anthony Horowitz NEW SPIES. NEW RULES. Brigitte Sharp is a brilliant but haunted young MI6 hacker. When she decodes encrypted online messages, which she believes are connected to her best friend's murder, Bridge uncovers evidence of a mole inside a top secret Anglo-French military drone project. Forced back into the field by MI6, after three years deskbound and in therapy, she discovers that the truth behind the Exphoria code is far worse than she could have imagined. Soon she's on the run, desperate and alone, as a nuclear terrorist plot unfolds around her... ]]> |
the hacker series: Hardwired Meredith Wild, 2015-07-30 Determined to overcome a difficult past, Erica Hathaway learns early on to make it on her own. Days after her college graduation, she finds herself face to face with a panel of investors who will make or break her fledgling start-up website. The only thing she didn't prepare for was going weak in the knees over an arrogant and gorgeous investor who seems determined to derail her plans. Billionaire and rumoured hacker Blake Landon has already made his fortune in software, and he's used to getting what he wants. Captivated by Erica's drive and unassuming beauty, he's wanted nothing more than to possess her since she stepped into his boardroom. Determined to win her over, he breaks down her defences and fights for her trust, even if it means sacrificing a level of control he's grown accustomed to. But when Blake uncovers a dark secret from Erica's past, he threatens not just her trust, but the life she's fought so hard to create. The perfect new addiction for fans of Fifty Shades of Grey and Sylvia Day's Bared To You series. |
the hacker series: Hardline Meredith Wild, 2015-04-07 Software mogul Blake Landon has met his match in headstrong Erica Hathaway. While his controlling nature and her independent spirit continue to battle, Blake has no intention of letting her out of his life again. Erica has given Blake her trust and her love, determined that they will conquer any challenges together. But when he demands more and tests the boundaries of her commitment, she is forced to face the dark desires he's kept hidden. As their bonds grow tighter, their enemies close in. With Erica's start-up in danger, Blake's frustration grows as he tries to protect her from those who would ruin her only to get to him. Can their relationship survive when Blake's enemies cross the line and threaten more than her livelihood? |
the hacker series: Idoru (b) Pattern Recognition William Gibson, 1997 A mystery centered on a virtual-reality marriage. The groom is Rez, the star of a rock band, while the bride is Rei Toei, the beautiful and entirely virtual pop singer adored by all Japan. Why would a man want to marry a woman who does not exist? Flesh and blood Chia McKenzie from Seattle, who loves Rez, flies to Tokyo to find out. |
the hacker series: The Wim Hof Method Wim Hof, 2022-04-14 THE SUNDAY TIMES BESTSELLING PHENOMENOM 'I've never felt so alive' JOE WICKS 'The book will change your life' BEN FOGLE My hope is to inspire you to retake control of your body and life by unleashing the immense power of the mind. 'The Iceman' Wim Hof shares his remarkable life story and powerful method for supercharging your strength, health and happiness. Refined over forty years and championed by scientists across the globe, you'll learn how to harness three key elements of Cold, Breathing and Mindset to master mind over matter and achieve the impossible. 'Wim is a legend of the power ice has to heal and empower' BEAR GRYLLS 'Thor-like and potent...Wim has radioactive charisma' RUSSELL BRAND |
the hacker series: Outlaw Ted Dekker, 2013-10-22 New York Timesbestselling author Ted Dekker brings an exotic tale of adventure and creates his most memorable character ever. The story of how I, Julian Carter, and my precious two-year old son, Stephen, left Atlanta Georgia and found ourselves on a white sailboat, tossed about like a cork on a raging sea off of Australia's northern tip in 1963, is harrowing. But it pales in comparison to what happened deep in the jungle where I was taken as a slave by a savage tribe unknown to the world. Some places dwell in darkness so deep that even God seems to stay away. There, my mind was torn in two by the gods of the earth. There, one life ended so another could begin. Some will say I was a fool for making the choices I made. But they would have done the same. They, too, would have embraced death if they knew what I knew, and saw through my eyes. My name is Julian and this is my story. But more, it is the story of my son who was born to change the world. From deep in the impenetrable jungles where New York Times bestselling author Ted Dekker was born and raised, comes OUTLAW, an epic adventure of two worlds that perhaps only he could write. Full of harrowing twists, sweeping violence, and wild love, Outlaw takes us beyond the skin of this world to another unseen. |
the hacker series: Hardpressed Meredith Wild, 2013-12-01 In Hardpressed, the highly anticipated second book of the Hacker Series that began with Hardwired, Blake and Erica face threats that put both their love and their lives on the line. Despite Blake Landon s controlling ways, the young and wealthy hacker finally won the trust of the woman he loves. Internet entrepreneur Erica Hathaway broke down the walls that kept her from opening her heart and her business to Blake. Ready to start this new chapter in her life, Erica is determined not to let anything come between them, even if that means giving Blake back some of the control he craves in and out of the bedroom. But when demons from her past threaten their future, Erica makes a decision that could change their lives forever. |
the hacker series: Hacker Series Box Set Books 1-5 Meredith Wild, 2019-04-05 Devour all five books in the addictive #1 New York Times bestsellingseries that's sold over a million copies worldwide, perfect for those who love Fifty Shades. (Heroes and Heartbreakers) Hardwired Erica Hathaway has had to work hard her whole life-first when she lost her parents and then to prove herself in the male-dominated tech world. The only thing she didn't prepare for was billionaire and rumored hacker Blake Landon. He's sexy, intimidating, and determined to win her over. But when Blake uncovers a dark secret from Erica's past, even he may not be able to protect her. Hardpressed Erica has broken down the walls that kept her from opening her heart and her business to Blake, and she's determined not to let anything come between them. But when demons from her past threaten their future, Erica makes a decision that could change their lives forever. Hardline Erica has given Blake her trust and her love, and he has no intention of letting her out of his life again. But when he tests the boundaries of her commitment, she is forced to face the dark desires he's kept hidden. As their bonds grow stronger, their enemies are closing in. With Erica's company in danger, Blake must protect her from those who would ruin her only to get to him. Hard Limit When life has torn them apart, Blake and Erica have always found their way back to each other, deeper in love and stronger than ever. But on the verge of making the ultimate commitment, Erica uncovers an unsettling chapter of Blake's history. As danger lurks and dark secrets come to light, will the past destroy their promise of forever? Hard Love Just when Blake and Erica think their troubles are safely behind them, Blake finds himself at the center of a massive scandal, haunted by the transgressions of his hacker past. But when he defies the authorities and refuses to seek the truth, will he let his past win? Or can Erica convince him that their life together is worth fighting for-now more than ever? |
the hacker series: Hacker Five Book Series Meredith Wild, 2016-06-09 |
the hacker series: Hardline Meredith Wild, 2014-06-13 The next installment in the relationship between Erica Hathaway, a recent college graduate and businesswoman, and billionaire investor Blake Landon. |
hacker.org - The Hacker Community Online
The hacker explores the intersection of art and science in an insatiable quest to understand and shape the world around him.
Challenge - hacker
object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="ChallengeMap" width="100%" height="100% ...
hacker.org - User Control Panel - Register
Doing so may lead to you being immediately and permanently banned, with notification of your Internet Service Provider if deemed required by us. The IP address of all posts are recorded to …
BitBath - hacker
Play and hack a war game. BitBath is a programming game, where the players create bots to duel in a virtual arena.
Runaway Robot - hacker
Play and hack a runaway robot puzzle game.
hacker.org - Reset password
Reset password Email address: This must be the email address associated with your account. If you have not changed this via your user control panel then it is the email address you registered your …
Hacker Score History
Hacker Score History ... text history
hacker.org - The Hacker Community Online
The hacker explores the intersection of art and science in an insatiable quest to understand and shape the world around him.
Challenge - hacker
object classid="clsid:D27CDB6E-AE6D-11cf-96B8-444553540000" id="ChallengeMap" width="100%" height="100% ...
hacker.org - User Control Panel - Register
Doing so may lead to you being immediately and permanently banned, with notification of your Internet Service Provider if deemed required by us. The IP address of all posts are recorded to …
BitBath - hacker
Play and hack a war game. BitBath is a programming game, where the players create bots to duel in a virtual arena.
Runaway Robot - hacker
Play and hack a runaway robot puzzle game.
hacker.org - Reset password
Reset password Email address: This must be the email address associated with your account. If you have not changed this via your user control panel then it is the email address you …
Hacker Score History
Hacker Score History ... text history