computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Secrets of my suburban life

After a stack of Harry Potter books kill Ren's mother, she finds herself trapped in a Connecticut suburb with her father who grieves too much to live in New York. But when a new friend at school confides to Ren that she is communicating online with an older man, Ren comes up with a plan to stop it.
Cover image of Secrets of my suburban life

Internet security and you

"Learn about the importance of internet security, how to protect yourself, and what to do if you get hacked"--Provided by publisher.
Cover image of Internet security and you

Spooky ballet!

Young Amelia, a secret agent, investigates a class of entranced ballet students, a scarecrow that can control crows, and a librarian whose work on the school library's computers seems to turn students into robots.
Cover image of Spooky ballet!

Navigating cyberspace

Discusses the hazards of cyberspace, what dangers to watch out for, being prepared, and more.
Cover image of Navigating cyberspace

Internet safety

Discusses issues and controversies related to Internet safety in the early twenty-first century, describing the dangers and risks, exploring the ways that criminals access information and the role of the government in protecting citizens, and providing tips and advice to stay safe and protect personal identities while using the Internet.
Cover image of Internet safety

Cowboy Bebop

A graphic novel which chronicles the exploits of the hapless Bebop crew as they strive to save the world.

Sandworm

a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
2019
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers . . . The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, [this book] considers the danger this force poses to our national stability and security.
Cover image of Sandworm

Top secret science in cybercrime and espionage

2019
"Spying and surveillance has always relied on cutting-edge science to push the boundaries. The same techniques are often used today by hackers to commit online data security breaches. This . . . book [is for] readers who have an interest in spymaker gadgets, computer science, and biometric data for online identification and security"--Provided by publisher.
Cover image of Top secret science in cybercrime and espionage

Staying safe online

2019
In this book, readers will learn the necessary steps to stay safe online.
Cover image of Staying safe online

Cybersecurity careers

2019
"Today, people and businesses keep almost all their important data online, and it is the job of cybersecurity experts to make sure that information never falls into the wrong hands. Comments from people in the industry, current statistics and forecasts, and realistic descriptions provide a useful look at jobs ranging from cybersecurity engineers to incident handlers to white hat hackers"--Provided by the publisher.
Cover image of Cybersecurity careers

Pages

Subscribe to RSS - computer crimes