Uses three true case studies to describe how hackers can use the Internet to incite terror, crash computer systems, and catch criminals.
Google Drive & Doc ...
Computer science f ...
Coding for kids ag ...
The Web designer's ...
Werewolves
Crop circles
The Bermuda Triang ...
Vampires
Digital citizenshi ...
Girls who code : l ...
Data and Goliath : ...
Invitation to comp ...
A teen's guide to ...
Cybersecurity and ...
Everything you nee ...
Strange but true : ...
Ethics and technol ...