computer security

Type: 
Topical Term
Subfield: 
a
Alias: 
computer security

Coding careers in internet security

Explores the various coding careers, focusing on internet security.

Using computer science in high-tech security careers

2020
Describes computer science career opportunities in the high-tech security industry, highlighting educational requirements and job search tips.

This is how they tell me the world ends

the cyber- weapons arms race
2020
"Zero day: a software bug that allows a hacker to break into your devices and move around undetected. For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar to hackers willing to sell their lock-picking code and their silence. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down. [The author] lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel"--OCLC.

Coding careers in internet security

In recent years, computer programming, or coding, has become a core competency for all kinds of skilled workers, opening the door to a variety of jobs. Among these are jobs in internet security, which is a field that has grown in importance as more people work, shop, and play online. This essential guide introduces readers to the types of jobs available in this field both now and in the future, and the industries these jobs serve. It also discusses common security threats, new technologies to address them, and critical resources for getting involved.

Someone we know

2019
Neighbors begin to turn on each other after a series of break-ins is followed by a murder.

The sentinel

a Jack Reacher novel
2020
It is close to midnight on a Saturday night when Jack Reacher gets off a bus at the Greyhound station in Nashville. Reacher is in no hurry. He has no appointments to keep. No people to see. No scores to settle. Not yet anyway. But in the early morning hours, under particular circumstances, a familiar thought will be snaking through his sharp, instinctual lizard brain: A voice in his head telling him to walk away. Of course, this wouldn't be the first time he listened to his gut instead. Meanwhile, seventy-five miles south and west of Music City is a sleepy little town where a recently-fired guy nurses a grudge that will fester into fury, and a desire for payback. But who is watching him, standing guard over a long-buried secret, ready to strike before it can be revealed? If you don't have a sense of the danger you're in, then it's best to have Reacher.

Cyber smart

five habits to protect your family, money, and identity from cyber criminals
2019

Personal data management

2018
Discusses personal data management, covering how to protect personal data, what data is at risk, how to create a strong password, and more.

Hack attack!

"When their robot classmate, Ro-Bud, gets a computer virus, the Code Academy gang is determined to help her. Along the way, they learn what a virus is, and how 'hackers' break into computers to steal information or cause damage. This easy-to-follow book simplifies computer concepts to help readers learn why it's important to keep passwords secret to protect computers"--Provided by publisher.

Living with the Internet and online dangers

Examines the dangers and risks associated with the Internet, discussing how teens can protect themselves when emailing, searching the Web, looking for a job online, using social networking sites, buying at online stores, and cyber-chatting.
Cover image of Living with the Internet and online dangers

Pages

Subscribe to RSS - computer security