computer networks

Type: 
Topical Term
Subfield: 
a
Alias: 
computer networks

Cybersecurity careers

2019
"Today, people and businesses keep almost all their important data online, and it is the job of cybersecurity experts to make sure that information never falls into the wrong hands. Comments from people in the industry, current statistics and forecasts, and realistic descriptions provide a useful look at jobs ranging from cybersecurity engineers to incident handlers to white hat hackers"--Provided by the publisher.
Cover image of Cybersecurity careers

Genius communication inventions

from Morse code to the internet
Printing words in books originated in China with the invention of movable type. But books aren't the only way we've communicated throughout history. Find out who invented the first radio, which complicated code took 267 years to crack, and how cloth weaving inspired computer programs. Learn more about the methods and machines people have used to communicate?from cave paintings and the earliest written alphabets to TVs and computers.
Cover image of Genius communication inventions

The Internet

Introduces readers to the science that makes the Internet possible.
Cover image of The Internet

Cybersecurity

protecting your identity and data
2018
"Introduces readers to the importance of cybersecurity, addresses the current risks from hackers, viruses and other malware, identity thieves, and other online perils, [and] provides concrete measures that young digital natives can take to protect themselves and their computers, smartphones, and other devices"--Provided by publisher.
Cover image of Cybersecurity

Tips for local and global cybersecurity

2019
"Cybercrime can threaten any entity, from small businesses to entire governments. In this guide to cybersecurity, readers will learn about cryptocurrencies, how to spot digital deception, and how to deal with cybermobs and trolls. On a global scale, cyberspying by international intelligence agencies can range from intellectual property theft to hacking into infrastructure and military, while whistleblowers are sometimes hailed as defenders of free speech and sometimes vilified as traitors and threats to security. All of these issues are addressed with case studies, . . . tips, and infographics"--Provided by publisher.

Tips for your personal cybersecurity

2019
"[Provides] . . . steps to protect identity and privacy, even as more everyday household devices are connected to the internet"--Provided by publisher.

Battle of the bots

2018
Despite the evil Locke, Cleo and Evan manage to get Gabriel back to his world, but it is a world that is controlled by a computer network which is connected by a device called a Neuro-Zip implanted in the skull of every human being in the world--every human except for Cleo and Evan, so it is up to them to bring down the Network, and return control to the human population.
Cover image of Battle of the bots

In search of Jefferson's moose

notes on the state of cyberspace
2009
Explores the known and unknown aspects of cyberspace and examines how it can be governed; and discusses file sharing, copyright laws, Internet pornography, freedom of speech, spam, cyberterrorism, shared personal information online, and more.
Cover image of In search of Jefferson's moose

Google cybersecurity expert Parisa Tabriz

2018
"As a child, [Parisa] Tabriz loved to play games with her brothers and she played to win. When she couldn't outmuscle them, she tried to outsmart them. In high school, she excelled at math and science. She also liked drawing and painting. She considered a career as an artist and even as a police officer. Years later, Tabriz became an information security engineer at Google. How did she go from battling her brothers to fighting cybercriminals at one of the world's most important tech companies? Read on to learn all about the life of Google's top security brain."--Publisher.
Cover image of Google cybersecurity expert Parisa Tabriz

Cybersecurity analyst

"As cyberattacks on computers and other digital devices have proliferated worldwide, so too has the need for cybersecurity analysts. Incidents of hacking and data theft have created higher demand than ever for these professionals. What the job entails, what it pays, and future prospects are discussed along with insights from industry insiders"--Amazon.com.
Cover image of Cybersecurity analyst

Pages

Subscribe to RSS - computer networks