computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Cybercrime

using computers as weapons
Computers can be powerful tools for creating positive change, but in the wrong hands, they can also be destructive weapons. Cybercrime is a growing field of criminal activity, and it is important to know as much as possible about it to avoid becoming a victim. Also discusses how to prepare for an exciting career investigating cybercriminals.

Warcross

"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--.

Cyber attacks, counterattacks, and espionage

"In this ... book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime"--Amazon.com.

Hate crimes in cyberspace

Discusses the dangers of cyberbullying and cyberstalking.

Avoiding online hoaxes

Provides information and advice about online hoaxes, discussing how to avoid, identify, and remove them, in addition to other related topics.

Ethical hacker

2016
Provides information on computer hacking and hacking as a career in the security department of a company or government agency.

Online security

2017
With everyone online and everything being connected to an "Internet of Things" new applications bring new vulnerabilities. Current and emerging security threats are discussed, along with what technologists, policy makers, and ordinary citizens are doing to make the digital world safer and more secure.

Online privacy

2017
As much as most people value their privacy, the amount of information they share freely on social media is astounding. While this sharing may help create communities, security experts say it also destroys privacy. This book will discuss the scope of the growing privacy problem, potential consequences of (3z(Boversharing,(3y (Band efforts to address it.

Hacked

2015
Introduces the dangers of hacking and how to defend against hackers.

The Snowden files

the inside story of the world's most wanted man
Edward Snowden is one of the most extraordinary whistleblowers in history. A precocious computer specialist who rapidly rose through the ranks of the U.S. intelligence community, Snowden was only twenty-nine years old when he exposed the National Security Agency's mass surveillance program of citizens, which collects and stores people?s phone calls, emails, and contacts. Forced to flee the country to escape federal prosecutors, he remains a controversial figure in exile, having been called, by turns, a traitor, a hero, a dissident, a patriot.

Pages

Subscribe to RSS - computer crimes