Browse all books

Other editions of book Computer Science and IT: Investigating a Cyber Attack

  • Computer Science and IT: Investigating a Cyber Attack

    Anne Rooney

    Paperback (Heinemann, July 1, 2013)
    When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.
  • Computer Science and IT: Investigating a Cyber Attack

    Anne Rooney

    Library Binding (Heinemann, July 1, 2013)
    When Ben discovers that his Facebook page has been changed, he is worried. Then someone sends emails from his account! Have his personal and work files been hacked? This book looks at the topics of computer science and information and communications technology to explain how Ben's laptop and his company's network have been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.
  • Computer Science and It

    Anne Rooney

    Hardcover (Raintree, Sept. 12, 2013)
    When Ben discovers that his Facebook page has been changed, he is seriously worried! This book looks at the topics of computer science and communications technology to explain how Ben's laptop and network has been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.
  • Computer Science and It

    Anne Rooney

    Paperback (Raintree, Aug. 14, 2014)
    When Ben discovers that his Facebook page has been changed, he is seriously worried! This book looks at the topics of computer science and communications technology to explain how Ben's laptop and network has been compromised, and how the systems administrator, network manager, and police investigators can track down the person carrying out the cyber attack.
    Z