-
-
c2018., Primary, PowerKids Press Call No: 004.67 8083 Availability:1 of 1 At Location(s) Series Title: Keep yourself safe on the Internet.Summary Note: This engaging book teaches readers the importance of avoiding strangers online, and what to do if a stranger does try to talk to them.
-
-
2015., Adolescent, Viking Call No: Sci Fi Fic Ford Genre: Science Fiction Availability:1 of 1 At Location(s) Summary Note: When his math genius neighbor Ben manages to uncover the key to modern data encryption systems, Robert "Smiles" Smylie comes up with an idea to protect Ben from government agents out to steal the key. But while carrying out his plan, Smiles discovers that his own past may prove the greatest danger to both himself and Ben.
-
-
2018., Pre-adolescent, PowerKids Press Call No: 005.8 Harris Edition: First edition. Availability:1 of 1 At Location(s) Series Title: Spotlight on kids can code.Summary Note: Learn about digital security and how to keep your information safe.
-
-
2018., Juvenile, PowerKids Press Call No: 005.8 HARRIS Edition: First edition. Availability:1 of 1 At Location(s)Click here to view Series Title: Spotlight on kids can codeSummary Note: Offers easy-to-understand language and color photographs to discuss the basics of digital security, including how computer technicians fight against cybercrime.
-
-
[2015]., Adolescent, Twenty-First Century Books Call No: CRIME & PUNISHMENT NF GIL Availability:1 of 1 At Location(s) Summary Note: Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.
-
-
-- Cyberbullying :c2016., Pre-adolescent, 12-Story Library Call No: 302.3 Availability:1 of 1 At Location(s) Summary Note: Provides 12 informative questions and answers about cyberbullying.
-
-
[2019]., Adolescent, ReferencePoint Press Call No: 364.14 HUL Availability:1 of 1 At Location(s) Series Title: STEM careers (ReferencePoint Press)Summary Note: "Digital devices such as cell phones, laptops, smart watches, fitness trackers, and more connect the world together and make life more convenient. Many people have become so dependent on digital technology that they could not conduct their business or manage their daily lives without it. They sleep with smart phones by their pillows, as if the device were an extension of the body. The more people rely on technology, however, the more vulnerable they become to data breaches or technology failures"--Provided by publisher.
-
-
[2021]., Adolescent, Twenty-First Century Books Call No: 364.16 MIL Availability:1 of 1 At Location(s) Summary Note: "As the digital world grows, teens must be aware of threats to their online privacy and security. This book details forms of cyberspying, explores careers in cyberintelligence, and looks at various online threats"--Provided by publisher.
-
-
2003., Enslow Publishers Call No: 364.16 MEN Availability:1 of 1 At Location(s) Series Title: Issues in focusSummary Note: Describes what a cyberwar might be like, who the enemy might be, and how the U.S. might respond.
-
-
Juvenile Call No: 005 Availability:2 of 2 At Location(s) Summary Note: The Dark Web is a part of the internet that is hidden and hard to access. It allows users to remain anonymous. Some people use the Dark Web because they fear for their safety. Others use the Dark Web to sell illegal products or services. The Dark Web explores issues in policing the Dark Web. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.
-
-
c1998., St. Martin's Griffin Call No: 813 .54 Availability:1 of 1 At Location(s) Summary Note: When the National Security Agency's invincible code-breaking machine encounters a mysterious code it cannot break, the agency calls head cryptographer, Susan Fletcher, a brillant, beautiful, mathematician. What she uncovers sends shock waves through the corridors of power and..
-
-
[2016], Pre-adolescent, 45th Parallel Press, an imprint of Cherry Lake Pub. Call No: 005.8 Availability:1 of 1 At Location(s) Summary Note: Provides information on computer hacking and hacking as a career in the security department of a company or government agency.
-
-
c2013., Grove Press Call No: COMPUTERS & TECHNOLOGY NF LAP Edition: 1st ed. Availability:1 of 1 At Location(s) Summary Note: Discusses the history of the American telephone system and the flaw that was exploited by underground, counter-culture phone phreaks and mobsters through the use of technology developed by Steve Jobs and Steve Wozniak, and the federal government's efforts to stop them.
-
-
Ã2011., Back Bay Books/Little, Brown Call No: COMPUTERS & TECHNOLOGY NF MIT Edition: 1st Back Bay pbk. ed. Availability:1 of 1 At Location(s) Summary Note: Kevin Mitnick discusses his life as a wanted hacker by the FBI, describing his interest in infiltrating the computers and networks of large corporations, and providing insight into the computer security industry in the twenty-first century.
-
-
Call No: 364.16 HAC Availability:1 of 1 At Location(s) Summary Note: Hackers can break into government websites, nuclear power plants, and the NSA. They can steal corporate secrets, top-secret security code, and credit card numbers. Through social media, they can plant ideas, manipulate public opinion, and influence elections. And there's precious little we can do to stop them. this book documents the dramatic increase in hacking and data mining incidents in recent years. The articles within it explore how these incidents affect world events, such as the United Kingdom's Brexit vote and the 2016 U.S. presidential election. Investigative articles reveal who is behind these incidents, why they happened, and how we can protect our data.
-
-
2013., Tor Teen Call No: [Fic] Edition: 1st ed. Availability:1 of 1 At Location(s) Summary Note: When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
-
-
-- Home landÃ2013., Adolescent, Tor Teen, a Tom Doherty Associates book Call No: Science FIC DOC Edition: 1st trade pbk. ed. Availability:1 of 1 At Location(s) Summary Note: When Marcus, once called M1k3y, receives a thumbdrive containing evidence of corporate and governmental treachery, his job, fame, family, and well-being, as well as his reform-minded employer's election campaign, are all endangered.
-
-
c2014., ReferencePoint Press Call No: 004.67 8 Availability:1 of 1 At Location(s) Series Title: In controversySummary Note: Integrating facts and a variety of contrasting opinions, this book examines the origins of the Internet privacy controversy, how data collection undermines privacy on the Internet, how hackers use the Internet to violate privacy, and what can be done to limit privacy violation on the Internet.
-
-
2014., ReferencePoint Press, Inc Call No: 323.44 CUR Availability:1 of 1 At Location(s) Series Title: In controversy series
-
-
Juvenile Call No: 005 Availability:1 of 1 At Location(s) Summary Note: Many people store and share personal information online. This information is part of a person's identity. Identity thieves can find and steal this information. Identity Theft explores how people can protect themselves from identity theft. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.