computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

The ransomware hunting team

a band of misfits' improbable crusade to save the world from cybercrime
2022
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--Provided by publisher.

Protect your data and identity online

2022
"School, work, banking, and shopping have all moved online in our modern world. This can be convenient for users, but it also means that sensitive data is at risk. Criminals seek to steal that data to carry out crimes. 'Protect Your Data and Identity Online' examines these risks and explains how users can take steps to defend themselves"--Provided by publisher.

Coding democracy

how hackers are disrupting power, surveillance, and authoritarianism
2020
Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers as vital disruptors, inspiring a new wave of activism in which ordinary citizens take back democracy. Hackers have a bad reputation, as shady deployers of bots and destroyers of infrastructure. In Coding Democracy, Maureen Webb offers another view. Hackers, she argues, can be vital disruptors. Hacking is becoming a practice, an ethos, and a metaphor for a new wave of activism in which ordinary citizens are inventing new forms of distributed, decentralised democracy for a digital era. Confronted with concentrations of power, mass surveillance, and authoritarianism enabled by new technology, the hacking movement is trying to "build out" democracy into cyberspace.

The art of invisibility

the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
2019
"[Kevin Mitnick maintains that] your every step online is being tracked and stored, and your identity literally stolen ... [He] uses true-life stories to show exactly what is happening without your knowledge, teaching you 'the art of invisibility' -- online and real-world tactics to protect you and your family, using easy step-by-step instructions ... [Covers] everything from password protection and smart Wi-FI usage to advanced techniques designed to maximize your anonymity"--Provided by publisher.

Becoming an ethical hacker

"Go behind the scenes and be mentored . . . to find out what it's really like, and what it really takes, to become an ethical hacker"--Dust jacket.

Hack attack!

2020
"When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how 'hackers' break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers"--Provided by publisher.

Using computer science in high-tech security careers

Examines cybersecurity careers, highlighting different jobs, educational requirements, and job search tips.

Hacker cracker

a journey from the mean streets of Brooklyn to the frontiers of cyberspace
The author, raised by an extended family in the Bedford-Stuyvesant neighborhood of Brooklyn, tells the story of how he became involved with computers, and discusses some of his exploits as a hacker before becoming a security specialist for a large financial firm.

Cyber attack

Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.

Cyber wars

2018
Information and disinformation can be powerful weapons. In the internet age, nations and nonstate actors seek to accomplish foreign policy goals using cyberspace.

Pages

Subscribe to RSS - computer security