SEARCH ENGINE RESULTS Your search for programmer produced the following results. These results are based on your Content Filter setting
| Lonely R. Richard Imprint: Self-Published Genres: Action/Adventure Romance, Romance - general Available Formats to Download: MOBI EPUB MS Word PDF MS Reader Text RTF CLICK HERE to get told when further books by this author are published Jim Till is a computer programmer, working for the Lozenge Corporation.
Jim refuses an assignment to White Sands Missile Range.
As a result of his refusal, Jim is politically and physically harassed by the Lozenge Corporation.
Jim finds ways to fight back. The ways involve lawyers and a few physical fights.
One of the lawyers is hot young Janice. |
| RTP R. Richard Imprint: Self-Published Genres: Action/Adventure, Science Fiction Available Formats to Download: Palm MOBI EPUB MS Word PDF MS Reader Text RTF CLICK HERE to get told when further books by this author are published This is the story of a working real-time computer programmer.
It's maybe a little dull, except that he manages to out politic the politicians within his company.
Well, the guy then gets called to Washington D.C. and he gets involved with spies, hackers and a sexy female security agent.
With the Washington D.C. Problem solved, the guy then figures a plan to use to hackers to achieve worthwhile goals.
Then he gets involved in a court case, involving computers. He turns the trial into a circus, with the help of a Navy JAG. |
| Scientific Thief R. Richard Imprint: Self-Published Genres: Romance Short Story, SciFi Romance Available Formats to Download: Palm MOBI EPUB MS Word PDF MS Reader Text RTF CLICK HERE to get told when further books by this author are published Someone is stealing money from terrorist organizations, with no traces and the terrorists are being severely disrupted.
The US government and several private organizations are attempting to track down the thief, but without success.
The thief is obviously a skilled computer hacker.
There's only one person who even has a clue as to who the hacker might be.
However, that person has their own agenda. |
|