Catalog Search Results
1) Cybercrime
Language
English
Description
Offering a panoramic view of opinions selected from a diverse range of international sources, this book traces controversies on cybercrime (illegal online activities) and the laws that target cybercrime.
Author
Language
English
Description
The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide...
3) Wildcard
Author
Language
English
Appears on list
Description
"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats"--
Emika Chen barely made it out of the Warcross Championships alive. Knowing the truth behind Hideo's new NeuroLink algorithm, she is determined to put a stop to his plans. But someone has put a bounty on Emika's head, and her sole chance for survival lies with Zero and the Blackcoats, his ruthless...
Author
Language
English
Description
"In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen, including the first-ever blackouts triggered by hackers. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest companies--from drug manufacturing to software...
5) Warcross
Author
Language
English
Appears on list
Description
"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire"--Provided by the publisher.
7) Cyberattacks
Language
English
Description
Contains a collection of essays about cyberattacks and cyberterrorism, and highlights the applications of cyberattacks, how they occur, and what can be done to prevent them.
8) The ransomware hunting team: a band of misfits' improbable crusade to save the world from cybercrime
Author
Language
English
Description
"The story of a band of volunteer cybersecurity experts who use their computer skills to crack ransomware and help victims of cybercrime"--
9) Cyber crime
Language
English
Description
This book is a collection of articles in which authors debate whether cyber crime is a serious problem, how companies and consumers can reduce the impact of cyber crime, and what laws will best prevent cyber crime.
Author
Language
English
Description
"Michael used to live the game. Now the games he was playing have become all too real. Only weeks ago, Sinking into the Sleep was fun. The VirtNet combined the most cutting-edge technology and the most sophisticated gaming for a full mind-body experience. And it was Michael's passion. But now every time Michael Sinks, he risks his life. The games are over. The VirtNet has become a world of deadly consequences, and Kaine grows stronger by the day....
Author
Language
English
Formats
Description
"Cyberbullying among teens happens every day. Harsh words and damaging photos exchanged through texts, email, or social media can result in humiliation, broken friendships, punishment at school, and even legal prosecution. In some cases, online harassment has contributed to suicide. Faced with this frightening problem, parents, educators, and teens are looking for information and advice. But few cyberbullying resources speak to teens themselves. Written...
13) Dark angel
Author
Language
English
Description
Letty Davenport's days working a desk job at are behind her. Her previous actions at a gunfight in Texas and her incredible skills with firearms draw the attention of several branches of the US government, and make her a perfect fit for even more dangerous work. The Department of Homeland Security and the NSA have tasked her with infiltrating a hacker group, known only as Ordinary People, that is intent on wreaking havoc. Letty and her reluctant partner...
14) Cybercrime
Author
Language
English
Description
Discusses the history, types, and methods of dealing with cybercrime.
15) Constant fear
Author
Language
English
Formats
Description
A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds.
When a drunk-driving accident ruined his life, only a popular survivalist blog helped to restore Jake's sense of control. He's become an avid Doomsday Prepper, raising his diabetic son, Andy, to be ready for any sudden catastrophe. Jake works as a custodian at isolated Pepperell Academy...
16) Wired: a novel
Author
Language
English
Description
"A beautiful computer hacker and a bad-boy FBI agent must collaborate--in more ways than one--in the sizzling new novel from #1 New York Times bestselling author Julie Garwood. Allison Trent doesn't look like a hacker. In fact, when she's not in college working on her degree, she models on the side. But behind her gorgeous face is a brilliant mind for computers and her real love is writing--and hacking--code. Her dream is to write a new security program...
Language
English
Description
We'd like to think they're invincible, but America's power stations, water supplies, financial systems, and military communications are all vulnerable to attack. And the most pressing threat isn't from bombs or other physical dangers-it's from computer hacking. What can be done to protect our infrastructure and prevent a devastating digital assault? To find out, this CNBC Original documentary goes to the frontlines of the war on cybercrime and cyber-terrorism....
19) Brainy Bees
Language
English
Description
Reacting quickly in an emergency depends increasingly on security cameras to recognize faces. We have special regions of the brain dedicated to the task of face recognition and constantly do it without effort or a second thought. But for computers and security systems it's more difficult. In this video clip, hear from scientists who are studying the way bees see and process the world in an attempt to improve surveillance technology.
Author
Language
English
Description
This book looks at the topics of computer science and information and communications technology to explain how computers and networks can be compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.