computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Cyber crime

Presents an introduction to different types of computer-based crime, and discusses the efforts of law enforcement officials to find and stop cyberspace criminals.

Careers in computer forensics

Provides an overview of various careers in computer forensics.

Teen cyberbullying investigated

where do your rights end and consequences begin?
Presents a collection of landmark court cases involving teens and charges of cyberbullying, providing the decisions of the court along with questions for readers about each case.

Cyber mobs, trolls, and online harassment

"As young people continue to share more of their lives online, social media opens up increasing opportunities for international dialogue, but it also means they run the risk of encountering the problematic parts of a virtual community, such as cyber mobs, bullies, and trolls. This thoroughly researched text takes a deep dive into these issues, examining the reasons they happen, common ways to identify them, and tips for protecting oneself from becoming a victim. Readers use full-color photographs, quotes from experts, sidebars, and discussion questions to develop a comprehensive overview of online issues and take precautions in their digital life"--.

Cybersecurity

A look at cybersecurity, covering the history of the Internet,hackers, hacktivists, threats to companies and personal computers, electronic warfare and terror, and more.

Online security

Examines the development of online security and discusses the growing threat of cybercriminals, identity theft, threats against computer and company networks, national security issues, cyberterrorism, and related topics.

The Internet and crime

Presents divergent viewpoints on whether or not the internet should be monitored.

Cyberattacks

2024
"The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them"--Provided by publisher.
Cover image of Cyberattacks

Cybersecurity and information security analysts

a practical career guide
Introduces careers in cybersecurity, discussing what the jobs are like, the skills and education needed, the salary, the pros and cons of the jobs, and their future outlook. Also discusses the importance of developing a career plan, and offers tips on applying and interviewing. Includes black-and-white photographs, sidebars, interviews with professionals in the field, a glossary, and sources for further learning.
Cover image of Cybersecurity and information security analysts

Hunting a hacker

using science to crack cybercrime
2023
Today, cybercrime is an enormous problem and one that threatens our future security. But we have two awesome weapons with which to fight it: science and technology. This exciting book explores the work of scientists and crime agencies in their battles to hunt hackers and crack cybercrimes. True-crime stories bring the mysterious world of cybercrime and its technological threats to life in this fascinating read.
Cover image of Hunting a hacker

Pages

Subscribe to RSS - computer crimes