computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Data and Goliath

the hidden battles to collect your data and control your world

Cyber attack

2015
Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.

The vo-tech track to success in information technology

2015
Discusses what it takes to achieve success in the fields of information science and information technology, and gives practical advice on how to use vocational school, training programs, and college to obtain such careers as computer programmer, software engineer, computer technician, or IT support.

Cybersecurity and cyberwar

what everyone needs to know
2014
Provides information on cybersecurity, discussing the central issues, how cybersecurity works, and why it is important.

Online privacy and social media

2015
Governments, businesses, and individuals all rely extensively on online communication and information but repeated news reports of online breaches do not inspire confidence in the online world. This is true in many areas including social media. What information is collected, how it is used or misused, and how it can be protected are covered in this book.

Online privacy and hacking

2015
Governments, businesses, and individuals all rely on secure online communication and information but increasing news reports about online breaches due to hackers can shake users' confidence in the online world. How hackers operate, what kinds of sites and information are most vulnerable to hacking, are all discussed in this book.

Online privacy and government

2015
Recent revelations of extensive government surveillance programs pit privacy concerns against the need to fight terrorism and crime. Using cases involving real people, this book explores how federal agencies, local law enforcement, and even schools are collecting, using and perhaps abusing the personal information they gather online.

Online privacy and business

2015
Governments, businesses, and individuals all rely extensively on online communication and information but repeated news reports of online breaches do not inspire confidence in the online world. What information is collected, how it is used or misused, and how it can be protected are among the topics covered in this book.

Computer science and IT

investigating a cyber attack
Looks at the topics of computer and network security through the story of a young professional whose computer is hacked. Includes information on how to keep computers safe, detect and report an attack, and restore an infected computer.

Dear Hacker

letters to the editor of 2600
2010

Pages

Subscribe to RSS - computer security