Hacking and data privacy : how exposed are we? / edited by the New York Times editorial staff.
Publisher: New York, NY : New York Times Educational Publishing, ©2019Edition: First edition.Description: 223 pages: illustrations ; 24 cm.Content type: text | still image Media type: unmediated Carrier type: volumeISBN: 9781642820836.Subject(s): Hackers -- Juvenile literature | Computer crimes -- Juvenile literature | Data protection -- Juvenile literature | Privacy, Right of -- Juvenile literature | Young adult literatureGenre/Form: Print books.Current location | Call number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|
On Shelf | HV6773 .H334 2019 (Browse shelf) | Available | AU00000000013509 |
Browsing Alfaisal University Shelves , Shelving location: On Shelf Close shelf browser
HV6773 .F39 2019 Kingdom of lies : unnerving adventures in the world of cybercrime / | HV6773 .F65 2020 Hacker states / | HV6773 .H325 2017 Hacking and freedom of information / | HV6773 .H334 2019 Hacking and data privacy : how exposed are we? / | HV6773 .M38 2018 Cyber mercenaries : the state, hackers, and power / | HV6773 .M38 2019 Ethical hacking / | HV6773 .M45 2019 Cult of the Dead Cow : how the original hacking supergroup might just save the world / |
Includes bibliographical references and index.
Intro; CHAPTER 1; CHAPTER 2; Chapter 3; Facebook Leaves Its Users' Privacy Vulnerable; How Researchers Learned to Use Facebook 'Likes' to Sway Your Thinking; For Many Facebook Users, a 'Last Straw' That Led Them to Quit; How Calls for Privacy May Upend Business for Facebook and Google; Chapter 4.
Hackers can break into government websites, nuclear power plants, and the NSA. They can steal corporate secrets, top-secret security code, and credit card numbers. Through social media, they can plant ideas, manipulate public opinion, and influence elections. And there's precious little we can do to stop them. this book documents the dramatic increase in hacking and data mining incidents in recent years. The articles within it explore how these incidents affect world events, such as the United Kingdom's Brexit vote and the 2016 U.S. presidential election. Investigative articles reveal who is behind these incidents, why they happened, and how we can protect our data.