computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Protect your data and identity online

2022
"School, work, banking, and shopping have all moved online in our modern world. This can be convenient for users, but it also means that sensitive data is at risk. Criminals seek to steal that data to carry out crimes. 'Protect Your Data and Identity Online' examines these risks and explains how users can take steps to defend themselves"--Provided by publisher.

Online scams

2022
"Examines the risks and benefits of using the internet today. Readers will learn the history of important online issues, the warning signs of common online dangers, and the ways in which they can get online safely and responsibly"--Provided by publisher.

Cyber mobs, trolls, and online harassment

As young people continue to share more of their lives online, social media opens up increasing opportunities for international dialogue, but it also means they run the risk of encountering the problematic parts of a virtual community, such as cyber mobs, bullies, and trolls. This thoroughly researched text takes a deep dive into these issues, examining the reasons they happen, common ways to identify them, and tips for protecting oneself from becoming a victim. Readers use full-color photographs, quotes from experts, sidebars, and discussion questions to develop a comprehensive overview of online issues and take precautions in their digital life.

Sandworm

a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
2020
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers . . . The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, [this book] considers the danger this force poses to our national stability and security . . ."--Provided by publisher.

Cyberterrorism

"Anthology of curated articles exploring cyberterrorism and cyber attacks used to create chaos and fear. The viewpoints in this resource debate the potential damage created by cyberterrorism, how it can be prevented, and who is responsible for policing it"--Provided by publisher.

Digital cryptology

2022
As our time spent online increases, our need for strong encryption to keep our data safe also increases. Learn about mathematics that are the basis of encryption, plus cyberattacks, digital currency, and cryptocurrency.

Hacked

2020
An introduction to the dangers of computer hackers on the Internet.

Cyber attack

Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.

The underworld

criminals in action
2019
"There are numerous underground organizations of crime hidden from the public. These criminals work diligently to keep their crimes secret in order to successfully execute their deceitful and dangerous missions. Through this . . . text, readers are given an in-depth look at secretive subjects such as organized crime, corruption in politics, fraud schemes, phishing and spam, and the drug trade"--Amazon.

Hacked

An introduction to the dangers of computer hackers on the Internet.

Pages

Subscribe to RSS - computer crimes