computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Likewar

the weaponization of social media
"Two defense experts explore the collision of war, politics, and social media, where the most important battles are now only a click away"--Provided by publisher.

Troll factories: Russia's web brigades

"Many Americans became aware of Russia's web brigades during the 2016 presidential election, during which allegations of Russian interference came to light. However, Russia's history of online meddling extends back to the early 2000s and far beyond just the United States. This volume explores the little known history of Russia's troll factories and the role they have played in various political movements and events, as well as the factors that enabled this interference and the possible means of combatting it"--Provided by publisher.

Privacy rights in the digital age

Discusses the practical, political, psychological, and philosophical challenges we face as technological advances have changed the landscape of traditional notions of privacy.
Cover image of Privacy rights in the digital age

Coding for digital security

"In this book, readers will learn expert tips to make sure their passwords are secure and their log-in information is safe. They'll also learn more about the cyberwar that happens every day on the Internet as security experts and malicious hackers do battle. Topics include passwords, encryption, network security, and cyberterrorism"--Amazon.com.
Cover image of Coding for digital security

Internet surveillance and how to protect your privacy

2017
This guide provides common-sense tips about how to avoid online theft and the mining of data by advertisers and others.
Cover image of Internet surveillance and how to protect your privacy

Hacking and data privacy

how exposed are we?
Presents a collection of essays selected from the New York Times that looks at computer hacking and data privacy.
Cover image of Hacking and data privacy

Cool careers without college for people who love coding

This guide is all a coding enthusiast needs to get started planning and building a career, all without having to worry about student loans.
Cover image of Cool careers without college for people who love coding

Real-world STEM: securing cyberspace

Examines the security of cyberspace, discussing what exists now, how it is being improved, along with some of the challenges and possible solutions.
Cover image of Real-world STEM: securing cyberspace

Cybersecurity expert

With our use of technology increasing every day, it's not surprising that our need for cybersecurity experts is also growing. In this informative text, readers will learn about why we need cybersecurity and what these security experts do to keep sensitive digital information safe. Students are introduced to the concept of computational thinking, as well as STEM concepts addressed in the Next Generation Science Standards. Informational diagrams and full-color photographs help students make connections with the text.
Cover image of Cybersecurity expert

Biometrics

your body and the science of security
2017
A guide to biometrics and the science behind security.

Pages

Subscribe to RSS - computer security