Welcome to Excelic Press

Computer Crimes


  • ISBN: 9781637856796
  • Contributors: Calaigh Sewards
  • Format: Hardcover
  • Year: 2022
  • Pages:  295
  • Availability: In Stock

Share this product


Crimes via the internet are called cybercrime. This book concentrates on cybercrimes, the most happening crime today. The price of information is more than a piece of land. Your information is used because of cybercrime. From citizens to netizens, we spend all our time on the internet. Our calls are heard, our chats are read, and our interests and thoughts are monitored. This book’s main theme is computer crime and prevention. The first chapter discusses computer crimes and cybercrimes. Though there is a little difference between them, we gave a clear description. The most important topic in the first chapter is cyber forensics. How cyber experts deal with cybercriminals will be very exciting. The second chapter is about the types of cybercrimes. The crimes related to person, property, and government are discussed. Cybercriminals are not directly associated with the victim. They may be hired or referred. These types of cyber criminals are mentioned in chapter 3. One type of cybercrime is doing crime in the victim’s name, which is called identity theft, as described in chapter 4.

The basics of cybersecurity start from chapter 6. The server’s cloud systems are clearly discussed in this. Cloud computing is the talk of the town in today’s world. Unfortunately, this is also a good chance for hackers. If A machine is hacked, only one person’s data will be stolen, but bulk data can be stolen if a cloud is hacked. So, it is mandatory to provide security for cloud systems. When a private transfer of data happens, there are many forms of receiving data from sender to receiver. That’s all about cryptography. Shortly it’s the combination of encryption and decryption. Hackers who can decrypt the code can read your message. All these tactics are in chapter 6. Chapter 7 is a total story of cyberattacks. The various methods used by hackers are discussed. Chapters 8, 9, and 10 are the laws to protect and prevent data. The last chapter is about real-life incidents of computer crimes. So, with the help of this book, you can gain a to z knowledge about computer crimes.


There are no reviews yet.

Be the first to review “Computer Crimes”