computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Digital rights and privacy

An anthology of essays examining digital rights and privacy, including government restrictions and data collection.

Cybersecurity

A look at cybersecurity, covering the history of the Internet,hackers, hacktivists, threats to companies and personal computers, electronic warfare and terror, and more.

Privacy and digital security

Explores online privacy and security, including encryption and hacking, and contains an interview with a cybersecurity expert.

Privacy, security, and cyberspace

Examines problems associated with computer use, including identity theft, viruses, privacy issues, phishing, and more.

Cybersecurity and information security analysts

a practical career guide
Introduces careers in cybersecurity, discussing what the jobs are like, the skills and education needed, the salary, the pros and cons of the jobs, and their future outlook. Also discusses the importance of developing a career plan, and offers tips on applying and interviewing. Includes black-and-white photographs, sidebars, interviews with professionals in the field, a glossary, and sources for further learning.
Cover image of Cybersecurity and information security analysts

Outsmart computer viruses

2024
"Most people know that viruses can make people very sick. But there are also certain kinds of viruses that can infect computers. In this book, readers will learn about computer programs called viruses, and how they can harm devices and even steal information. The book will explain how users can keep their computers and other technology safe and what to do if a virus happens to infect their device. The text includes fact boxes and full-color photographs to enhance STEM learning. Approachable language encourages independent reading and comprehension"--Provided by publisher.

Hacking

The Art of Exploitation
2008
Presents a guide to computer hacking, including step-by-step information on exploiting sloppy programming, using buffer overflows and format strings, writing code, redirecting network traffic, and cracking encryptions, and contains core techniques and clever tricks to create new hacks and defend against potential attacks. Accompanying LiveCD provides a complete Linux programming and debugging environment.

Murder in the Sentier

2002
Detective Aimee Leduc has reason to believe that her mother belongs to a group of terrorists resembling the 1960s Red Terror gang.

NFTs for dummies

2022
This book provides straightforward answers to the most important parts of the non-fungible tokens (NFTs) phenomenon, helping readers to get a handle on this cutting edge tech and how to start making it work for them.

Intelligence and cybersecurity careers in the military

2023
The US military mission is to protect the United States and its allies from attacks by adversaries and enemies around the world. Today, wide ranging attacks include cyberattacks on computer systems, increasing nuclear expansion by adversaries, and terrorist attacks on civilian people. To address these threats, the military has developed programs that specifically are devoted to intelligence, which is the collecting and analyzing of information about potential threats, and cybersecurity, information technology focused on securing computer networks.

Pages

Subscribe to RSS - computer security