computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Warcross

2017
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--.
Cover image of Warcross

Encyclopedia of cyber warfare

2017
"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher.

The Dark Web

the covert world of cybercrime
2019
What types of crimes are constructed on the dark web? This question and many more are answered in this engaging exploration of cybercrime.

Stay safe online

2018
Explains what Internet safety is and how to stay safe while online.

Tips for local and global cybersecurity

2019
"Cybercrime can threaten any entity, from small businesses to entire governments. In this guide to cybersecurity, readers will learn about cryptocurrencies, how to spot digital deception, and how to deal with cybermobs and trolls. On a global scale, cyberspying by international intelligence agencies can range from intellectual property theft to hacking into infrastructure and military, while whistleblowers are sometimes hailed as defenders of free speech and sometimes vilified as traitors and threats to security. All of these issues are addressed with case studies, . . . tips, and infographics"--Provided by publisher.

Tips for your personal cybersecurity

2019
"[Provides] . . . steps to protect identity and privacy, even as more everyday household devices are connected to the internet"--Provided by publisher.

What's cyberbullying?

As young readers explore this informative book on a sensitive issue, they're provided with facts about this problem and advice for what to do if they or someone they know is being cyberbullied.

Thinking critically

Examines issues related to cybercrime such as how it threatens people and society, protection of private data, and legislation to protect against cybercrime.

Cyberterrorism and ransomware attacks

A collection of global perspectives that examines the potential of cyberterrorism and ransomware attacks and how we can secure ourselves in the future.

Warcross

"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--.
Cover image of Warcross

Pages

Subscribe to RSS - computer crimes