|
![]() |
|||
|
||||
OverviewThe ubiquity of computers and smartphones has reshaped nearly every aspect of contemporary life, from how we communicate to how we shop. However, it has also provided a new avenue for criminal activity. Cyberattacks can take many forms, but in general they involve hackers gaining unauthorized access to computers or Internet networks in order to change, destroy, disable, or steal information. These attackers can be private individuals launching cyberattacks for financial gain, governments and state-sponsored groups using cyberattacks to spy on their enemies or attack their infrastructure, and hacktivists who use attacks to reveal illegal or immoral activity. This volume examines the various applications of cyberattacks, how they occur, and what can be done to prevent them. Full Product DetailsAuthor: Scientific American EditorsPublisher: Scientific American Educational Publishing Imprint: Scientific American Educational Publishing Dimensions: Width: 15.40cm , Height: 1.40cm , Length: 23.00cm Weight: 0.476kg ISBN: 9781725350168ISBN 10: 1725350165 Pages: 160 Publication Date: 30 December 2023 Recommended Age: From 14 to 15 years Audience: Young adult , Teenage / Young adult Format: Hardback Publisher's Status: Active Availability: Available To Order ![]() We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |