computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Cyberwarfare

2018
Includes a wide range of opinions surrounding issues concerning cyberwarfare.
Cover image of Cyberwarfare

Investigating cybercrime

2018
This book will introduce readers to the dark world of cybercrime, the various disguises cybercrime can take, and the increased need to combat cybercrime, as well as highlight the fascinating world of cybercrime investigation, including training, education, real-world cases, and typical salary ranges.
Cover image of Investigating cybercrime

Hacked

Look out! Your computer data is not safe. There are hackers who will steal it. Sell it. Or destroy it. The hackers are getting smarter. They leave little trace as to their identities. And there are dangerous consequences for individuals, corporations.
Cover image of Hacked

Digital forensics

2018
"An in-depth look at how digital forensic examiners analyze devices with forensic tools to prevent cybercrimes and catch criminals, employing real-life examples such as the BTK killer case"--Provided by the publisher.
Cover image of Digital forensics

Club CSI: The case of the digital deception

2013
A classmate needs Club CSI's help when mysterious charges from a popular Internet doodling game appear on her parents' credit card bill.
Cover image of Club CSI: The case of the digital deception

Online predators and privacy

2014
A guide for young readers that offers advice on how to stay safe while online, including being careful when chatting online, never answering personal questions, not opening or answering questions from strangers, only visiting chat rooms that have a moderator, and more.
Cover image of Online predators and privacy

Wildcard

"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--.
Cover image of Wildcard

Hacking and data privacy

how exposed are we?
Presents a collection of essays selected from the New York Times that looks at computer hacking and data privacy.
Cover image of Hacking and data privacy

Cyber-thief showdown

Geronimo Stilton's identity is stolen on the Internet and Professor Margo Bitmouse, a well-known computer expert, helps him track down the hacker before his reputation is ruined.
Cover image of Cyber-thief showdown

Pages

Subscribe to RSS - computer crimes