computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Computer science and IT

investigating a cyber attack
2014

Lost girls

an unsolved American mystery
2013
"A literary account of the lives and presumed serial killings of five "Craigslist" prostitutes, whose bodies were found on the same Long Island beach in 2010. Based on the New York Magazine cover story"--Provided by publisher.

The next war zone

confronting the global threat of cyberterrorism
2002
Explains the hidden dangers of cyberterrorism, discussing how terrorists have the power to shut down the world's airports, power plants, factories, fuel supplies, armed forces, and the Internet, and explains what measures can be taken to reduce the threat of cyberterrorism.

Viruses and spam

2008
This book describes computer viruses, viruses programmed to hurt your computer by damaging programs, deleting files, or reformatting your hard disk, and spam, the e-mail version of junk mail, and discusses options for protection against "malware," programs harmful to computers.

Cyber bullying

protecting kids and adults from online bullies
2009
Offers information and advice on cyberbullying, discussing what it is, causes, methods, legal issues, prevention, and other related topics.

Spooky ballet!

2011
Young Amelia, a secret agent, investigates a class of entranced ballet students, a scarecrow that can control crows, and a librarian whose work on the school library's computers seems to turn students into robots.

How serious a problem is computer hacking?

2014
An exploration of controversies related to computer hacking that discusses the origins of the problem of hacking; provides varying perspectives on how hacking causes harm to individuals, businesses, and countries, and discusses whether legislation to prevent hacking is economically and politically feasible.

Hackers and hacking

a reference handbook
Offers a variety of studies and articles on the issue of computer hackers and cyber crimes, discussing the history of computer hacking and the laws that have been made to counteract cyber criminal activities.

Rule 34

2012
Edinburgh Detective Inspector Liz Kavanaugh, head of the Innovative Crime Investigation Unit, responsible for monitoring the Internet in 2023, is drawn into an international investigation after three ex-cons, united only by criminal records for spamming and a taste for unorthodox erotica, are murdered in Italy, Germany, and Scotland.

Ghost in the wires

my adventures as the world's most wanted hacker
2012
Kevin Mitnick was the most elusive computer break-in artist in history and no matter how fast the authorities were, Mitnick was faster. This is the story of his unbelievable escapes and the ultimate showdown with the Feds.

Pages

Subscribe to RSS - computer crimes