computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Hacking and data privacy

how exposed are we?
Presents a collection of essays selected from the New York Times that looks at computer hacking and data privacy.
Cover image of Hacking and data privacy

Cyber-thief showdown

Geronimo Stilton's identity is stolen on the Internet and Professor Margo Bitmouse, a well-known computer expert, helps him track down the hacker before his reputation is ruined.
Cover image of Cyber-thief showdown

Everything you need to know about sextortion

2018
This sensitive yet frank book empowers readers in grades seven to twelve to take on a particularly insidious adversary. Readers will learn to identify, avoid, and repair damage done by a sextortionist by reading about case studies, advice from the FBI and Interpol, and the latest in cybersecurity techniques. Call-outs offer information that is sure to pique the reader s interest and draw connections between technology, people, and security, while the wealth of resources for further study will equip readers with the means to take action. This title reassures victims that they are not alone and points them toward compassionate help.
Cover image of Everything you need to know about sextortion

Zap!

Eleven-year-olds Luis and Maura investigate the cause of a long-term, city-wide power outage in Hampton, New Jersey. Includes facts about electric power and instructions for assembling an emergency kit.
Cover image of Zap!

Cyber mobs

destructive online communities
2018
Engaging sidebars provide examples of cyber mob attacks, and a list of resources is provided for anyone who may be experiencing online bullying.
Cover image of Cyber mobs

Cybersecurity expert

With our use of technology increasing every day, it's not surprising that our need for cybersecurity experts is also growing. In this informative text, readers will learn about why we need cybersecurity and what these security experts do to keep sensitive digital information safe. Students are introduced to the concept of computational thinking, as well as STEM concepts addressed in the Next Generation Science Standards. Informational diagrams and full-color photographs help students make connections with the text.
Cover image of Cybersecurity expert

The game of lives

2017
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day. The Mortality Doctrine--Kaine's master plan--has nearly been realized, and little by little the line separating the virtual from the real is blurring. If Kaine succeeds, it will mean worldwide cyber domination. And it looks like Michael and his friends are the only ones who can put the monster back in the box--if Michael can figure out who his friends really are"--Provided by publisher.

White and black hat hackers

Readers learn the differences among white hat, black hat, and gray hat hackers and their ways of working concerning computer networks today.

American kingpin

the epic hunt for the criminal mastermind behind the Silk Road
2017
Discusses criminal investigation that eventually caught the computer and drug crime leader, Ross Ulbrict.

Cybercrime

Presents viewpoints about Cybercrime that is selected from a wide range of highly respected sources and publications.

Pages

Subscribe to RSS - computer crimes