×
Uh-oh, it looks like your Internet Explorer is out of date.
For a better shopping experience, please upgrade now.

9.99
In Stock
Overview
Attribution is a fictional novella that brings awareness to social injustice, cybersecurity, family breakdown, and autism by detailing 40 weeks in the life of a fourteen-year-old ninth-grader from Atlanta, Georgia who went from being a 'straight A' student and winning a hackathon to experiencing parental separation, expulsion from school, ending up as a national security threat and surviving a drone attack in a remote location in Montana.
Product Details
ISBN-13: | 9780578634678 |
---|---|
Publisher: | Lambo Publishing |
Publication date: | 01/12/2020 |
Pages: | 126 |
Product dimensions: | 5.50(w) x 8.50(h) x 0.30(d) |
Customer Reviews
Related Searches
Explore More Items
Throughout history, humankind's working theories regarding the cause of infectious disease have shifted drastically, as ...
Throughout history, humankind's working theories regarding the cause of infectious disease have shifted drastically, as
cultures developed their philosophic, religious, and scientific beliefs. Plagues that were originally attributed to the wrath of the gods were later described as having nothing ...
Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative ...
Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative
new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to ...
The interface between syntax and meaning, both semantic and pragmatic, has emerged as perhaps the ...
The interface between syntax and meaning, both semantic and pragmatic, has emerged as perhaps the
richest and most fascinating area of current linguistics theory. This study applies some of these ideas to hyperbaton, offering an original new theory with broad ...
The skills and tools for collecting, verifying and correlating information from different types of systems ...
The skills and tools for collecting, verifying and correlating information from different types of systems
is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers ...
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array ...
Organizations with computer networks, Web sites, and employees carrying laptops and Blackberries face an array
of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from ...
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got ...
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got
a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how ...
This illuminating book examines and refines the commonplace wisdom about cyber conflict—its effects, character, and ...
This illuminating book examines and refines the commonplace wisdom about cyber conflict—its effects, character, and
implications for national and individual security in the 21st century.Cyber warfare evokes different images to different people. This book deals with the technological aspects denoted ...
This book depicts rigorous and vigorous accounts of strategies used successfully by researchers to negotiate ...
This book depicts rigorous and vigorous accounts of strategies used successfully by researchers to negotiate
their way through the research maze. The metaphor of the maze evokes several different and sometimes contradictory elements of contemporary education research, including complexity, confusion, ...