Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
274
result(s) for
"Computer crimes Fiction."
Sort by:
Stealing the Network: How to Own an Identity
2005
The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Investing well (in supersonic spaceships!)
by
Bean, Raymond, author
,
Vimislik, Matthew, illustrator
,
Bean, Raymond. Benji Franklin, kid zillionaire
in
Computer crimes Juvenile fiction.
,
Artificial satellites Juvenile fiction.
,
Inventors Juvenile fiction.
2016
A cyber criminal is using satellites to steal billions from the world's biggest companies, and Benji Franklin is called upon to use his skills to trace the money--the problem is there is a time limit and his mother will not let him miss any more school, so he enlists his entire school to help.
How to own an identity
2005
The first two books in this series \"Stealing the Network: How to Own the Box\" and \"Stealing the Network: How to Own a Continent\" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air. \"Stealing the Network: How to Own an Identity\" is the 3rd book in the \"Stealing\" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this \"STN\" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft. Cast upon a backdrop of \"Evasion,\" surviving characters from \"How to Own a Continent\" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive. * The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005* All of the authors on the book are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book
Warcross
by
Lu, Marie, 1984- author
in
Internet games Juvenile fiction.
,
Computer crimes Juvenile fiction.
,
Hackers Juvenile fiction.
2017
\"When teenage coder Emika Chen hacks her way into the opening tournament of the Warcross Championships, she glitches herself into the game as well as a sinister plot with major consequences for the entire Warcross empire\"-- Provided by publisher.
Understanding Romance Fraud: Insights From Domestic Violence Research
by
Dragiewicz, Molly
,
Richards, Kelly
,
Cross, Cassandra
in
DOMESTIC VIOLENCE
,
Family violence
,
FRAUD
2018
Abstract
Romance fraud affects thousands of victims globally, yet few scholars have studied it. The dynamics of relationships between victims and offenders are not well understood, and the effects are rarely discussed. This article adapts the concept of psychological abuse from studies of domestic violence to better understand romance fraud. Using interviews with 21 Australian romance fraud victims, we show how offenders use non-violent tactics to ensure compliance with ongoing demands for money. This article identifies similarities and differences between domestic violence and romance fraud. We argue that thinking through domestic violence and romance fraud together offers potential benefits to both bodies of research.
Journal Article
Wildcard
by
Lu, Marie, 1984- author
,
Lu, Marie, 1984- Warcross (Series) ;
in
Internet games Juvenile fiction.
,
Computer crimes Juvenile fiction.
,
Hackers Juvenile fiction.
2018
\"Teenage hacker Emika Chen embarks on a mission to unravel a sinister plot and is forced to join forces with a shadowy organization known as the Blackcoats\"-- Provided by publisher.
The silicon jungle
2011
What happens when a naive intern is granted unfettered access to people's most private thoughts and actions? Young Stephen Thorpe lands a coveted internship at Ubatoo, an Internet empire that provides its users with popular online services, from a search engine and shopping to e-mail and social networking. When Stephen's boss asks him to work on a project with the American Coalition for Civil Liberties, Stephen innocently obliges, believing he is mining Ubatoo's vast databases to protect the ever-growing number of people unfairly targeted in the name of national security. But nothing is as it seems. Suspicious individuals--do-gooders, voyeurs, government agents, and radicals--surface, doing all they can to access the mass of desires and vulnerabilities gleaned from scouring Ubatoo's wealth of intimate information. Entry into Ubatoo's vaults of personal data need not require technical wizardry--simply knowing how to manipulate a well-intentioned intern may be enough.
Set in today's cutting-edge data mining industry,The Silicon Jungleis a cautionary tale of data mining's promise and peril, and how others can use our online activities for political and personal gain just as easily as for marketing and humanitarian purposes. A timely thriller,The Silicon Jungleraises serious ethical questions about today's technological innovations and how our most confidential activities and minute details can be routinely pieced together into rich profiles that reveal our habits, goals, and secret desires--all ready to be exploited in ways beyond our wildest imaginations.
Quantum
\"On the eve of a top secret space mission, Captain Calli Chase detects a tripped alarm in the tunnels deep below a NASA research center. A NASA pilot, quantum physicist, and cybercrime investigator, Calli knows that a looming blizzard and government shutdown could provide the perfect cover for sabotage, with deadly consequences. As it turns out, the danger is worse than she thought. A spatter of dried blood, a missing security badge, a suspicious suicide--a series of disturbing clues point to Calli's twin sister, Carme, who's been MIA for days. Desperate to halt the countdown to disaster and to clear her sister's name, Captain Chase digs deep into her vast cyber security knowledge and her painful past, probing for answers to her twin's erratic conduct. As time is running out, she realizes that failure means catastrophe--not just for the space program but for the safety of the whole nation\"-- Provided by publisher.
Stealing the Network
by
Long, Johnny
,
Mullen, Timothy
,
Russell, Ryan
in
Computer hackers
,
Computer security
,
Cyberterrorism
2007
The final book in the best selling series.