computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Mafiaboy

a portrait of the hacker as a young man
2011
In 2000, an unknown attacker brought down the websites of Amazon, CNN, Dell, E-TRADE, eBay, and Yahoo!, inciting panic from Silicon Valley to the White House. The FBI, police, and independent security experts launched a manhunt as President Clinton convened a cyber security summit to discuss how best to protect America's information infrastructure from future attacks. Then, after hundreds of hours of wiretapping, law enforcement officials executed a late-night raid and came face-to-face with the most wanted man in cyberspace: a fifteen-year-old whose username was "Mafiaboy." Despite requests from every major media outlet, that young man, Michael Calce, has never spoken publicly about his crimes-until now. Equal parts true-crime thriller and expos?, Mafiaboy will take you on an electrifying tour of the fast-evolving twenty-first-century world of hacking-from disruptions caused by teens like Calce to organized crime and other efforts with potentially catastrophic results. It also includes a guide to protecting yourself online.

Digital security

cyber terror and cyber security
2010
Discusses crimes commonly committed on the internet, and measures used to attempt to prevent them.

Takedown

the pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw-- by the man who did it
1996

The hundredth window

protecting your privacy and security in the age of the Internet
2000

The unwanted gaze

the destruction of privacy in America
2000

Cyberpunk

outlaws and hackers on the computer frontier
1995
A journey through the computer underground, a world of high-tech rebels and outlaws.

Cool careers for girls in cybersecurity and national safety

2004
Describes the different job opportunities available for women in cybersecurity and national safety, providing information on job responsibilities, training requirements, job outlook, and other related topics.

Digital fortress

2004
Cryptographer Susan Fletcher finds herself fighting for her country, her life, and the life of the man she loves when she is called in by the National Security Agency to decipher a mysterious code and discovers a plot that has the power to cripple U.S. intelligence.

Ghost in the wires

my adventures as the world's most wanted hacker
2011
The world's most famous former computer hacker, now a security consultant, describes his life on the run from the FBI creating fake identities, finding jobs at a law firm and a hospital, and keeping tabs on his pursuers.

Security vs. access

balancing safety and productivity in the digital school
2010
Discusses the balance between safety and productivity in Internet access in schools, describing the drawbacks of installing severe security measures, and explaining what teachers, administrators, and IT staff should know when deciding how much access students should receive.

Pages

Subscribe to RSS - computer security