Cyberattacks

"The ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them"--Provided by publisher.

Scientific American Educational Pub., in association with The Rosen Pub. Group
2024
9781725350168
book
Cover image of Cyberattacks

Holdings

hidmidmiidnidwidlocation_codelocationbarcodecallnumdeweycreatedupdated
3988270725999824128804661002957PMH360PMS0084443363.325 CYB363.3217368009911736800991