computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Cybersecurity and information security analysts

a practical career guide
Introduces careers in cybersecurity, discussing what the jobs are like, the skills and education needed, the salary, the pros and cons of the jobs, and their future outlook. Also discusses the importance of developing a career plan, and offers tips on applying and interviewing. Includes black-and-white photographs, sidebars, interviews with professionals in the field, a glossary, and sources for further learning.
Cover image of Cybersecurity and information security analysts

Outsmart computer viruses

2024
"Most people know that viruses can make people very sick. But there are also certain kinds of viruses that can infect computers. In this book, readers will learn about computer programs called viruses, and how they can harm devices and even steal information. The book will explain how users can keep their computers and other technology safe and what to do if a virus happens to infect their device. The text includes fact boxes and full-color photographs to enhance STEM learning. Approachable language encourages independent reading and comprehension"--Provided by publisher.

Hacking

The Art of Exploitation
2008
Presents a guide to computer hacking, including step-by-step information on exploiting sloppy programming, using buffer overflows and format strings, writing code, redirecting network traffic, and cracking encryptions, and contains core techniques and clever tricks to create new hacks and defend against potential attacks. Accompanying LiveCD provides a complete Linux programming and debugging environment.

Murder in the Sentier

2002
Detective Aimee Leduc has reason to believe that her mother belongs to a group of terrorists resembling the 1960s Red Terror gang.

NFTs for dummies

2022
This book provides straightforward answers to the most important parts of the non-fungible tokens (NFTs) phenomenon, helping readers to get a handle on this cutting edge tech and how to start making it work for them.

Intelligence and cybersecurity careers in the military

2023
The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about potential threats, and cybersecurity, information technology focused on securing computer networks.

The ransomware hunting team

a band of misfits' improbable crusade to save the world from cybercrime
2022
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--Provided by publisher.

Protect your data and identity online

2022
"School, work, banking, and shopping have all moved online in our modern world. This can be convenient for users, but it also means that sensitive data is at risk. Criminals seek to steal that data to carry out crimes. 'Protect Your Data and Identity Online' examines these risks and explains how users can take steps to defend themselves"--Provided by publisher.

Coding democracy

how hackers are disrupting power, surveillance, and authoritarianism
2020
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralised democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.

The art of invisibility

the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
2019
"[Kevin Mitnick maintains that] your every step online is being tracked and stored, and your identity literally stolen ... [He] uses true-life stories to show exactly what is happening without your knowledge, teaching you 'the art of invisibility' -- online and real-world tactics to protect you and your family, using easy step-by-step instructions ... [Covers] everything from password protection and smart Wi-FI usage to advanced techniques designed to maximize your anonymity"--Provided by publisher.

Pages

Subscribe to RSS - computer security