Our site will be undergoing maintenance from 6 a.m. - 6 p.m. ET on Saturday, May 20. During this time, Bookshop, checkout, and other features will be unavailable. We apologize for the inconvenience.
Cookies must be enabled to use this website.
Book Image Not Available Book Image Not Available

See inside

Book Image Not Available Book Image Not Available

See inside

The Continuing Adventures of Cyber Security Sam
Time Out

Overview


This is the story about a friendly high school freshman who happens to have a strong interest in how computers work. This interest gets him to ask questions and perform investigations that end up having him work with the FBI to solve Cyber Crime. In this story, the names are made up but the hacks are based on events that have actually happened in the industry.

Read more

Description


Time Out is a mystery, in which a bright high school boy named Sam helps investigate curious inconsistencies in his school's computer system. Sam befriends a new student, Jim. At a basketball game, they discover that the shot timer allows more time to their school's home team that to the visiting team, though it does not indicate a difference in the countdown. Sam asks his computer science teacher for help with this puzzle, and the teacher gives him administrative access to the school-wide system so that Sam can investigate it from home. Meanwhile, smaller mysteries seem to present themselves: the buses seem to arrive late to bring the students home, and students feel rushed in their classes. Through Sam's relentless investigative work he eliminates suspects and finally helps the FBI nail the evil doer.


Read more

About the author


After over 50 years of experience in protecting information for the U.S. Army Security Agency, NASA, the National Security Agency and many major corporations, Rich has decided to share his knowledge and experience through books, presentations and some consulting. His major purpose here is to share what he has learned with others and influence younger people to join in the fight against cyber crime.

I portion of the profits of this book will go to the Information Systems Security Association Education Foundation.

Read more

Book details

Genre:YOUNG ADULT FICTION

Subgenre:Mysteries & Detective Stories

Age Range (years):13 and up

Language:English

Series title:Cyber Security Sam

Series Number:1

Pages:100

eBook ISBN:9781098320058

Paperback ISBN:9781098320041


Overview


This is the story about a friendly high school freshman who happens to have a strong interest in how computers work. This interest gets him to ask questions and perform investigations that end up having him work with the FBI to solve Cyber Crime. In this story, the names are made up but the hacks are based on events that have actually happened in the industry.

Read more

Description


Time Out is a mystery, in which a bright high school boy named Sam helps investigate curious inconsistencies in his school's computer system. Sam befriends a new student, Jim. At a basketball game, they discover that the shot timer allows more time to their school's home team that to the visiting team, though it does not indicate a difference in the countdown. Sam asks his computer science teacher for help with this puzzle, and the teacher gives him administrative access to the school-wide system so that Sam can investigate it from home. Meanwhile, smaller mysteries seem to present themselves: the buses seem to arrive late to bring the students home, and students feel rushed in their classes. Through Sam's relentless investigative work he eliminates suspects and finally helps the FBI nail the evil doer.


Read more

About the author


After over 50 years of experience in protecting information for the U.S. Army Security Agency, NASA, the National Security Agency and many major corporations, Rich has decided to share his knowledge and experience through books, presentations and some consulting. His major purpose here is to share what he has learned with others and influence younger people to join in the fight against cyber crime.

I portion of the profits of this book will go to the Information Systems Security Association Education Foundation.

Read more