computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

White and black hat hackers

Readers learn the differences among white hat, black hat, and gray hat hackers and their ways of working concerning computer networks today.

Digital era encryption and decryption

Today's news headlines are plentifully peppered by the latest hacks into some of the world's largest and most reputable companies.

Cybercrime

Presents viewpoints about Cybercrime that is selected from a wide range of highly respected sources and publications.

Everything you need to know about digital privacy

An examination of digital privacy, covering related legislation, how to protect personal data, privacy crimes, and more.

Online privacy

Provides information and advice about online privacy, discussing how to keep information safe, avoid spyware and other security breaches, and other related topics.

Combating computer viruses

Provides information and advice about combating computer viruses, discussing how to avoid, identify, and remove them, in addition to other related topics.

Ethical hacker

2016
Provides information on computer hacking and hacking as a career in the security department of a company or government agency.

Online security

2017
With everyone online and everything being connected to an "Internet of Things" new applications bring new vulnerabilities. Current and emerging security threats are discussed, along with what technologists, policy makers, and ordinary citizens are doing to make the digital world safer and more secure.

Online privacy

2017
As much as most people value their privacy, the amount of information they share freely on social media is astounding. While this sharing may help create communities, security experts say it also destroys privacy. This book will discuss the scope of the growing privacy problem, potential consequences of (3z(Boversharing,(3y (Band efforts to address it.

Privacy and digital security

2015
"In the digital age, journalists have to be concerned about privacy and security like never before. This book teaches students of media about this brave new world. Journalists today need to protect their information and sources in unprecedented ways. Readers also learn how data encryption works. When using the Internet to do research, there’s always the potential for hacking. Finally, an interview with cyber security expert Brock Wood gives readers a sense of real-world threats to their privacy and security. This book is an indispensable resource to students of journalism in a cyber world."--Publisher description.

Pages

Subscribe to RSS - computer security