|
Plant-eating dinosaurs
|
Joseph Staunton |
"Profiles plant eating dinosaurs from the Devonian, Triassic, Jurassic, and Cretaceous periods"--Provided by publisher. |
OL13837291W |
|
Easy marks
|
Carolyn Keene |
Nancy goes undercover to investigate a grade-changing scheme at Brewster Academy. Someone has penetrated the school's computer and is extorting cash from students in exchange for upgrading their acad… |
OL15558582W |
|
Cyber crime and the victimization of women
|
Debarati Halder |
"This book investigates cyber crime, exploring gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing"-… |
OL16116820W |
|
Cybercrime and espionage
|
Will Gragido |
Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence withi… |
OL16240476W |
|
The law of cybercrimes and their investigations
|
George E. Curtis |
"Presenting a broad-based analysis, this volume explores the many aspects of cybercrime as well as its investigation and prosecution. It begins with an overview of the use of computers and other digi… |
OL16262759W |
|
Protecting your internet identity
|
Ted Claypoole |
"Protecting Your Internet Identity: Are you Naked Online? helps readers, young and old alike, understand the implications of their online personas and reputations. The authors offer a guide to the ma… |
OL16318337W |
|
Cybercrime
|
Sara L. Latta |
"Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher. |
OL16633732W |
|
Computer forensics for dummies
|
Linda Volonino |
A guide to the basics of computer forensics covers such topics as acquiring and examining e-evidence, extracting hidden data, filtering data, handling passwords and encrypted data, and exhibiting evi… |
OL16651210W |
|
Collaborative computer security and trust management
|
Jean-Marc Seigneur |
"This book combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field"--Provided by publisher. |
OL16936264W |
|
The Case Of The Digital Deception
|
Ellie O'Ryan |
Ben, Corey, and Hannah have their work cut out for them when Whitney, the most popular girl in school, comes to Club CSI: for help. At first her case seems easy to crack—someone has been tampering wi… |
OL17426868W |
|
Disarming Andi
|
Elizabeth Goddard |
Vance inherits a missile launch site - a relic from the cold war buried beneath the plains of North Dakota. But he doesn't consider staying in the underground dwelling until he meets Andi, the woman … |
OL17511735W |
|
Constant fear
|
Daniel Palmer |
A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds.
When a drunk-driving accident r… |
OL18149208W |
|
Intrusion Detection in Distributed Systems
|
Peng Ning |
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… |
OL19859329W |
|
The passion of Bradley Manning
|
Chase Madar |
"In May 2010, a soldier in the U.S. Army's famed 10th Mountain Division was arrested on suspicion of leaking nearly half a million classified government documents. Who is Private First Class Bradley … |
OL19956486W |
|
Sharing our lives online
|
David Brake |
"Most of us know someone who has inadvertently revealed something shameful or embarrassing online about themselves or someone else. With the growth of social media like Facebook and Twitter, we are h… |
OL19986453W |
|
The director
|
David Ignatius |
After being told that his agency has been hacked, the director of the CIA launches a hunt into the hacker underground of Europe and America. |
OL19988388W |
|
Hate crimes in cyberspace
|
Danielle Keats Citron |
The author examines the controversies surrounding cyber-harassment, arguing that it should be considered a matter for civil rights law and that social norms of decency and civility must be leveraged … |
OL19989319W |
|
The smart girl's guide to privacy
|
Violet Blue |
"Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create on… |
OL20006516W |
|
Computer forensics
|
Marie-Helen Maras |
Balancing technicality and legal analysis, this book enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of elec… |
OL20547302W |
|
Kindness wins
|
Galit Breen |
"If kindness wins, accountability rules. The need for this mantra is never clearer than when scrolling through posts and comments online. Approximately four out of ten kids (42 percent) have experien… |
OL21411986W |