Extortionware
FOR MATURE READERS ONLY. THIS TECHNO-THRILLER HAS, PROFANITY, VIOLENCE, SEXUAL SITUATIONS
Set in a typical American city Hacker Jason, a talented computer programmer is thrown into captivity with Tasha, a woman caught in the snare of human sex trafficking from the darkest part of the internet, where antivirus efforts and firewalls are shown to be ineffective and useless. Together they must invade computers remotely to steal what they can, to satisfy their captors. They embark on an unparalleled journey involving extortion, theft and violence using the same connection you use for your home and personal communications.
1119061072
Set in a typical American city Hacker Jason, a talented computer programmer is thrown into captivity with Tasha, a woman caught in the snare of human sex trafficking from the darkest part of the internet, where antivirus efforts and firewalls are shown to be ineffective and useless. Together they must invade computers remotely to steal what they can, to satisfy their captors. They embark on an unparalleled journey involving extortion, theft and violence using the same connection you use for your home and personal communications.
Extortionware
FOR MATURE READERS ONLY. THIS TECHNO-THRILLER HAS, PROFANITY, VIOLENCE, SEXUAL SITUATIONS
Set in a typical American city Hacker Jason, a talented computer programmer is thrown into captivity with Tasha, a woman caught in the snare of human sex trafficking from the darkest part of the internet, where antivirus efforts and firewalls are shown to be ineffective and useless. Together they must invade computers remotely to steal what they can, to satisfy their captors. They embark on an unparalleled journey involving extortion, theft and violence using the same connection you use for your home and personal communications.
Set in a typical American city Hacker Jason, a talented computer programmer is thrown into captivity with Tasha, a woman caught in the snare of human sex trafficking from the darkest part of the internet, where antivirus efforts and firewalls are shown to be ineffective and useless. Together they must invade computers remotely to steal what they can, to satisfy their captors. They embark on an unparalleled journey involving extortion, theft and violence using the same connection you use for your home and personal communications.
24.99
In Stock
5
1
24.99
In Stock
Product Details
BN ID: | 2940171521387 |
---|---|
Publisher: | Author's Republic |
Publication date: | 05/03/2017 |
Edition description: | Unabridged |
Videos

From the B&N Reads Blog