computer crimes

Type: 
Topical Term
Subfield: 
a
Alias: 
computer crimes

Cyberbullying and the law

Teens learn what rights they have, what powers schools possess, and what parts of the law are still in flux. Perhaps most important, they learn how to be activists rather than victims, effectively advocating for themselves and others.

Cyber technology

using computers to fight terrorism
2017
This book details how criminals, terrorists, and enemy governments attempt to use technology against the United States, and how we can counter this threat.

Cybercrime

using computers as weapons
Computers can be powerful tools for creating positive change, but in the wrong hands, they can also be destructive weapons. Cybercrime is a growing field of criminal activity, and it is important to know as much as possible about it to avoid becoming a victim. Also discusses how to prepare for an exciting career investigating cybercriminals.

Warcross

"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--.

Cyber attacks, counterattacks, and espionage

"In this ... book, readers will learn about some of the approaches used by attackers, what they are looking for, and how the experts work to protect sensitive information. For example, specialists in law enforcement sometimes turn the tables on the criminals and track them down using the very same technology criminals used to commit the crime"--Amazon.com.

Hate crimes in cyberspace

Discusses the dangers of cyberbullying and cyberstalking.

Avoiding online hoaxes

Provides information and advice about online hoaxes, discussing how to avoid, identify, and remove them, in addition to other related topics.

Ethical hacker

2016
Provides information on computer hacking and hacking as a career in the security department of a company or government agency.

Online security

2017
With everyone online and everything being connected to an "Internet of Things" new applications bring new vulnerabilities. Current and emerging security threats are discussed, along with what technologists, policy makers, and ordinary citizens are doing to make the digital world safer and more secure.

Online privacy

2017
As much as most people value their privacy, the amount of information they share freely on social media is astounding. While this sharing may help create communities, security experts say it also destroys privacy. This book will discuss the scope of the growing privacy problem, potential consequences of (3z(Boversharing,(3y (Band efforts to address it.

Pages

Subscribe to RSS - computer crimes