computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Someone we know

2019
Neighbors begin to turn on each other after a series of break-ins is followed by a murder.

The sentinel

a Jack Reacher novel
2020
It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury, and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher.

Cyber smart

five habits to protect your family, money, and identity from cyber criminals
2019

Personal data management

2018
Discusses personal data management, covering how to protect personal data, what data is at risk, how to create a strong password, and more.

Hack attack!

"When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how 'hackers' break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers"--Provided by publisher.

Living with the Internet and online dangers

Examines the dangers and risks associated with the Internet, discussing how teens can protect themselves when emailing, searching the Web, looking for a job online, using social networking sites, buying at online stores, and cyber-chatting.
Cover image of Living with the Internet and online dangers

You are the product

how your data is being sold
2020
Readers will learn how they can take steps to protect their privacy and reduce the amount of information available to data mining companies.
Cover image of You are the product

Helpful hackers

2019
"Who wants to be a helpful hacker? In this title, prospective helpful hackers will meet pioneers in the website hacking industry, examine the history of hacking, learn how to differentiate between good and bad hacks, stop security threats, and future trends in the industry"--Amazon.
Cover image of Helpful hackers

Mind games

2019
"Arden sells memories. Whether it's becoming homecoming queen or studying for that all important test, Arden can hack into a classmate's memories and upload the experience for you just as if you'd lived it yourself. Business is great, right up until the day Arden whites out, losing fifteen minutes of her life and all her memories of the boy across the school yard. The boy her friends assure her she's had a crush on for years. Arden realizes that her own memories have been hacked, but they haven't just been stolenand shared... they've been removed. And she's not the only one: her mysterious crush, Sebastian, has lost ALL of his memories. But how can they find someone who has the power tomake them forget everything they've learned?"--Amazon.
Cover image of Mind games

The Mueller report

" ... the Mueller inquiry focuses on Donald Trump, his presidential campaign, and Russian interference in the 2016 election, and draws on the testimony of dozens of witnesses and the work of some of the country's most seasoned prosecutors" -- Back of cover.
Cover image of The Mueller report

Pages

Subscribe to RSS - computer security