computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Careers in computer forensics

2014
Provides an overview of various careers in computer forensics.

Computer science and IT

investigating a cyber attack
Looks at the topics of computer and network security through the story of a young professional whose computer is hacked. Includes information on how to keep computers safe, detect and report an attack, and restore an infected computer.

Mafiaboy

a portrait of the hacker as a young man
2011
In 2000, an unknown attacker brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. The FBI, police, and independent security experts launched a manhunt as President Clinton convened a cyber security summit to discuss how best to protect America's information infrastructure from future attacks. Then, after hundreds of hours of wiretapping, law enforcement officials executed a late-night raid and came face-to-face with the most wanted man in cyberspace: a fifteen-year-old whose username was "Mafiaboy." Despite requests from every major media outlet, that young man, Michael Calce, has never spoken publicly about his crimes-until now. Equal parts true-crime thriller and expos?, Mafiaboy will take you on an electrifying tour of the fast-evolving twenty-first-century world of hacking-from disruptions caused by teens like Calce to organized crime and other efforts with potentially catastrophic results. It also includes a guide to protecting yourself online.

Bullying beyond the schoolyard

preventing and responding to cyberbullying
2009
Discusses cyberbullying, through use of computers, cell phones, and other electronics, and presents advice for identification, prevention, and appropriate response by educators to protect students, with tips on what the behavior looks like, a review of research and legal rulings, and follow-up questions.

Avoiding online hoaxes

2013
Provides information and advice about online hoaxes, discussing how to avoid, identify, and remove them, in addition to other related topics.

The case of the digital deception

Club CSI #5
2013
A classmate needs Club CSI's help when mysterious charges from a popular internet doodling game appear on her parents' credit card bill.

Digital security

cyber terror and cyber security
2010
Discusses crimes commonly committed on the internet, and measures used to attempt to prevent them.

Takedown

the pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw-- by the man who did it
1996

Approaching zero

the extraordinary underworld of hackers, phreakers, virus writers, and keyboard criminals
1992

Computer crime

1987
Discusses the crime new to this day and age, generated by electronic activity of an illegal nature. Presents security measures and apprehension techniques.

Pages

Subscribe to RSS - computer crimes