Books

20+ results found
Title Authors Description OpenBook ID
Plant-eating dinosaurs Plant-eating dinosaurs Joseph Staunton "Profiles plant eating dinosaurs from the Devonian, Triassic, Jurassic, and Cretaceous periods"--Provided by publisher. OL13837291W
Easy marks Easy marks Carolyn Keene Nancy goes undercover to investigate a grade-changing scheme at Brewster Academy. Someone has penetrated the school's computer and is extorting cash from students in exchange for upgrading their acad… OL15558582W
Cyber crime and the victimization of women Cyber crime and the victimization of women Debarati Halder "This book investigates cyber crime, exploring gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing"-… OL16116820W
Cybercrime and espionage Cybercrime and espionage Will Gragido Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence withi… OL16240476W
The law of cybercrimes and their investigations The law of cybercrimes and their investigations George E. Curtis "Presenting a broad-based analysis, this volume explores the many aspects of cybercrime as well as its investigation and prosecution. It begins with an overview of the use of computers and other digi… OL16262759W
Protecting your internet identity Protecting your internet identity Ted Claypoole "Protecting Your Internet Identity: Are you Naked Online? helps readers, young and old alike, understand the implications of their online personas and reputations. The authors offer a guide to the ma… OL16318337W
Cybercrime Cybercrime Sara L. Latta "Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher. OL16633732W
Computer forensics for dummies Computer forensics for dummies Linda Volonino A guide to the basics of computer forensics covers such topics as acquiring and examining e-evidence, extracting hidden data, filtering data, handling passwords and encrypted data, and exhibiting evi… OL16651210W
Collaborative computer security and trust management Collaborative computer security and trust management Jean-Marc Seigneur "This book combines perspectives of leading researchers in collaborative security to discuss recent advances in this burgeoning new field"--Provided by publisher. OL16936264W
The Case Of The Digital Deception The Case Of The Digital Deception Ellie O'Ryan Ben, Corey, and Hannah have their work cut out for them when Whitney, the most popular girl in school, comes to Club CSI: for help. At first her case seems easy to crack—someone has been tampering wi… OL17426868W
Disarming Andi Disarming Andi Elizabeth Goddard Vance inherits a missile launch site - a relic from the cold war buried beneath the plains of North Dakota. But he doesn't consider staying in the underground dwelling until he meets Andi, the woman … OL17511735W
Constant fear Constant fear Daniel Palmer A doomsday prepper and private school custodian must rescue his genius hacker son, who is caught by a brutal drug cartel for electronically siphoning off their funds. When a drunk-driving accident r… OL18149208W
Intrusion Detection in Distributed Systems Intrusion Detection in Distributed Systems Peng Ning Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu… OL19859329W
The passion of Bradley Manning The passion of Bradley Manning Chase Madar "In May 2010, a soldier in the U.S. Army's famed 10th Mountain Division was arrested on suspicion of leaking nearly half a million classified government documents. Who is Private First Class Bradley … OL19956486W
Sharing our lives online Sharing our lives online David Brake "Most of us know someone who has inadvertently revealed something shameful or embarrassing online about themselves or someone else. With the growth of social media like Facebook and Twitter, we are h… OL19986453W
The director The director David Ignatius After being told that his agency has been hacked, the director of the CIA launches a hunt into the hacker underground of Europe and America. OL19988388W
Hate crimes in cyberspace Hate crimes in cyberspace Danielle Keats Citron The author examines the controversies surrounding cyber-harassment, arguing that it should be considered a matter for civil rights law and that social norms of decency and civility must be leveraged … OL19989319W
The smart girl's guide to privacy The smart girl's guide to privacy Violet Blue "Discusses how to protect personal information from online privacy violations. Covers how to set and store secure passwords, monitor online visibility, safely use social media and apps, and create on… OL20006516W
Computer forensics Computer forensics Marie-Helen Maras Balancing technicality and legal analysis, this book enters into the world of cybercrime by exploring what it is, how it is investigated, and the regulatory laws around the collection and use of elec… OL20547302W
Kindness wins Kindness wins Galit Breen "If kindness wins, accountability rules. The need for this mantra is never clearer than when scrolling through posts and comments online. Approximately four out of ten kids (42 percent) have experien… OL21411986W
Next page