As a digital subscriber, you’ll receive unlimited access to Horn Book web exclusives and extensive archives, as well as access to our highly searchable Guide/Reviews Database.
To access other site content, visit The Horn Book homepage.
To continue you need an active subscription to hbook.com.
Subscribe now to gain immediate access to everything hbook.com has to offer, as well as our highly searchable Guide/Reviews Database, which contains tens of thousands of short, critical reviews of books published in the United States for young people.
Thank you for registering. To have the latest stories delivered to your inbox, select as many free newsletters as you like below.
No thanks. Return to article
(4)
YASpecial Reports series.
The authors describe the history of the internet, major security breaches (e.g., Target's customer data hack), and efforts to curb cyber crime. Although the fast-changing topic means the book will be quickly dated, the volume provides serviceable if dry background for report writers. Stock photographs and frequent sidebars contribute to the choppy layout. Reading list. Bib., glos., ind.