computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Computer evidence

A crime has occurred. Investigators have not yet found evidence. But when digital analysts arrive, they take a computer from the scene and find their first clue. Find out about the techniques and tools digital forensic investigators use to help bring even the toughest cases to a close.
Cover image of Computer evidence

Google cybersecurity expert Parisa Tabriz

2018
"As a child, [Parisa] Tabriz loved to play games with her brothers and she played to win. When she couldn't outmuscle them, she tried to outsmart them. In high school, she excelled at math and science. She also liked drawing and painting. She considered a career as an artist and even as a police officer. Years later, Tabriz became an information security engineer at Google. How did she go from battling her brothers to fighting cybercriminals at one of the world's most important tech companies? Read on to learn all about the life of Google's top security brain."--Publisher.
Cover image of Google cybersecurity expert Parisa Tabriz

Cyberwarfare

2018
Includes a wide range of opinions surrounding issues concerning cyberwarfare.
Cover image of Cyberwarfare

Investigating cybercrime

2018
This book will introduce readers to the dark world of cybercrime, the various disguises cybercrime can take, and the increased need to combat cybercrime, as well as highlight the fascinating world of cybercrime investigation, including training, education, real-world cases, and typical salary ranges.
Cover image of Investigating cybercrime

Hacked

Look out! Your computer data is not safe. There are hackers who will steal it. Sell it. Or destroy it. The hackers are getting smarter. They leave little trace as to their identities. And there are dangerous consequences for individuals, corporations.
Cover image of Hacked

Digital forensics

2018
"An in-depth look at how digital forensic examiners analyze devices with forensic tools to prevent cybercrimes and catch criminals, employing real-life examples such as the BTK killer case"--Provided by the publisher.
Cover image of Digital forensics

Club CSI: The case of the digital deception

2013
A classmate needs Club CSI's help when mysterious charges from a popular Internet doodling game appear on her parents' credit card bill.
Cover image of Club CSI: The case of the digital deception

Online predators and privacy

2014
A guide for young readers that offers advice on how to stay safe while online, including being careful when chatting online, never answering personal questions, not opening or answering questions from strangers, only visiting chat rooms that have a moderator, and more.
Cover image of Online predators and privacy

Wildcard

"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--.
Cover image of Wildcard

Pages

Subscribe to RSS - computer crimes