Catalog Search Results
Author
Language
English
Formats
Description
Inexperienced users of computers often jump at the chance to click colorful flashing ads on the sidebar and are also tempted to download files from sites not worthy of trust. In short, people need to learn how to stay safe online. This book will introduce readers to different types of online threats, including viruses and malware. They will learn how different dangers spread and some basic steps to stop or prevent them. Additionally, this book will...
Author
Language
English
Formats
Description
Explores "the criminal masterminds driving some of the biggest spam and hacker operations targeting Americans and their bank accounts. Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies--and countless viruses, phishing, and spyware attacks--he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere"--Amazon.com.
"In Spam Nation, investigative...
Author
Language
English
Formats
Description
Man vs Machine ... It is 1895, and Sherlock Holmes is settling back into life as a consulting detective at 221B Baker Street, when he and Watson learn of strange goings-on amidst the dreaming spires of Oxford. A Professor Quantock has built a wondrous computational device, which he claims is capable of analytical thought to rival the cleverest men alive. Naturally Sherlock Holmes cannot ignore this challenge. He and Watson travel to Oxford, where...
Author
Language
English
Formats
Description
Maura Nelson, who has a sophisticated background in science, medicine, and programming, has stumbled upon a way to execute someone using only the computers in her home office--silently, anonymously, leaving no trace of violence, so that her target appears to have died of natural causes. Maura tests her method by eliminating Syrian tyrant Bashar al-Assad, but this experience affects her so deeply that she doesn't want to continue alone. She entices...
Author
Series
Language
English
Description
Cybercriminals are criminals in the truest sense of the word. However, their techniques are highly specialized and technical. Their crimes are high-impact and often global, but, simultaneously, they are difficult to trace, often leading investigators on thrilling chases in an underworld society of coders and hackers. To combat the devastating work of cybercriminals, the need for cybercrime investigators has increased exponentially. This book will...
66) The fifth estate
Language
English
Formats
Description
WikiLeaks founder Julian Assange and his colleague Daniel Domscheit-Berg team up to become underground watchdogs of the very powerful. They create a platform that allows whistleblowers to anonymously leak covert data. But when Assange and Berg gain access to the biggest trove of confidential intelligence documents in U.S. history, they battle each other and a defining question of our time: what are the costs of keeping secrets in a free society, and...
67) Rule 34
Author
Series
Halting State volume 2
Language
English
Description
Meet Edinburgh Detective Inspector Liz Kavanaugh, head of the Innovative Crimes Investigation Unit, otherwise known as the Rule 34 Squad. They monitor the Internet for potential criminal activity, analyzing trends in the extreme fringes of explicit content. And occasionally, even more disturbing patterns arise…
Three ex-cons have been murdered in Germany, Italy, and Scotland. The only things they had in common were arrests for spamming—and...
Three ex-cons have been murdered in Germany, Italy, and Scotland. The only things they had in common were arrests for spamming—and...
Author
Series
Language
English
Description
No one loves Florida more, or can keep it safe from invasive criminal species better than self-appointed Sunshine Sheriff Serge Storms. When a particular scam leads to the death of a few innocents and a young woman's disappearance, Serge and his perpetually self-bent sidekick Coleman--aided by his new pal, latter-day noir private eye Mahoney -- load up the car for a riotous road trip to do right.
Author
Series
Language
English
Formats
Description
This book examines how people can become targets for cybercriminals, the dangers of identity theft, and how people can protect their financial data from attacks. Features include worksheets, key takeaways, a glossary, further readings, websites, source notes, and an index. Aligned to Common Core Standards and correlated to state standards.
Author
Language
English
Formats
Description
"In Digital Grooming, Nuria Lorenzo-Dus identifies and examines the online discourse of adults luring children for sexual abuse (digital sexual grooming); extreme ideology groups aligning others to their views (digital ideological grooming); and drug dealers soliciting business in crypto-markets (digital commercial grooming). With sophisticated style and stance analyses of large and varied datasets, the book reveals that, while displaying nuances,...
71) Online security
Author
Series
Language
English
Formats
Description
Discusses online security in the digital age, including the risk of identity theft, Internet attacks on corporate networks, and cyberterrorism, and describes methods to help secure online information both currently and in the future.
Author
Language
English
Description
The United States military now views cyberspace as the "fifth domain" of warfare, alongside land, air, sea, and space. The Pentagon, the National Security Agency, and the CIA field teams of hackers who launch cyber strikes against enemy targets--and amass staggering quantities of personal information on all of us. These same virtual warriors, along with a growing band of private-sector counterparts, are charged with defending us against the vast array...
74) Hacked
Author
Language
English
Formats
Description
Explains what computer hacking is, who does it, how dangerous it is for both individuals and companies, and the types of protective measures that can be taken to guard against it.
75) The expert
Author
Language
English
Formats
Description
Computer mogul James Perrein has been arrested on a charge of selling world-shaking encryption technology to the Chinese in violation of US law. For criminal attorney Rebecca Verona, it's an opportunity to advance her career and her firm's status. It also means defending a man she doesn't trust—a man who was once her lover. It was for Perrein that Rebecca ended her relationship with David Zuckerman, the prosecuting attorney who has just
...Author
Series
Splinter cell volume 7
Language
English
Formats
Description
"Veteran Fourth Echelon agent Sam Fisher has a new mission recruiting and training the next generation of Splinter Cell operatives for the NSA's covert action division, including his daughter Sarah. But when a lethal assassin from Fisher's past returns from the dead on a mission of murder, father and daughter are thrust into a race against time as a sinister threat to global security is revealed. A dangerous cyberwarfare technology known as Gordian...
Author
Language
English
Formats
Description
"The online world is an environment full of opportunity-and risks. Social networks and online shopping sites encourage users to share personal information about themselves, but this can expose them to Identity spoofing and theft. Digital Data Security explores the many issues involved with cyber security, how companies combat hackers, and and how individuals must take charge of their own digital safety."--
78) Spooky ballet!
Author
Series
Agent Amelia volume 4
Language
English
Formats
Description
Young Amelia, a secret agent, investigates a class of entranced ballet students, a scarecrow that can control crows, and a librarian whose work on the school library's computers seems to turn students into robots.
Language
English
Appears on list
Description
The story of Mega Man Battle Network takes place in the near-future interconnected world of Net Society, which depends upon computer programs known as Network Navigators (or NetNavi for short) to manage everything from their toasters to city power grids. While the networked age brings all manner of convenience, it has also imported a wave of cybercrime eroding all levels of society. In these games, players take on the role of Lan Hikari using their...
Didn't find it?
Can't find what you are looking for? Suggest a purchase. Submit Request