computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Be safe on the Internet

A young boy teaches his dog about being safe with personal information on the Internet, such as not telling his password to anyone, not playing violent games, and not telling strangers anything.

Internet security

from concept to consumer
2015
"Learn about the history of internet security and find out what it takes to make it in this exciting career field"--.

Ethical hacker

Provides information on computer hacking and hacking as a career in the security department of a company or government agency.

Cyber attack

2015
Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.

The cuckoo's egg

tracking a spy through the maze of computer espionage
2005
The author provides an account of how he tracked down "Hunter," a criminal who was hacking into the nation's computer networks to gain unauthorized access to sensitive military and security information.

@WAR

the rise of the military-Internet complex
The United States military now views cyberspace as the "fifth domain" of warfare, alongside land, air, sea, and space. All of our protection agencies field teams of hackers who launch cyber strikes against enemy targets. These virtual warriors, along with a growing band of private-sector counterparts, are charged with defending us against the vast array of criminals, terrorists, and foreign governments who attack us with ever-increasing frequency and effectiveness.

Private

Bradley Manning, Wikileaks, and the biggest exposure of official secrets in American history
2012
Examines Private Bradley Manning's involvement in exposing secrets to the whistleblower website WikiLeaks.

This machine kills secrets

Julian Assange, the Cypherpunks, and their fight to empower whistleblowers
Examines the internet "hacktivist" movement aimed at eliminating the secrets of every government on the planet using a relatively simple software that effortlessly hides the identity of whoever wishes to leak sensitive information. Explores the impact of sites like Wikileaks and figures like Julian Assange and Daniel Domscheit-Berg.

Cybercrime

A collection of twenty writings from around the globe discussing issues surrounding cybercrime. Examines who's vulnerable to cybercrime, laws pertaining to cybercrime, the connection between cybercrime and crime syndicates, and cyber espionage and cyberterrorism. Includes a world map, discussion questions, and organizations to contact.

Pages

Subscribe to RSS - computer crimes