You can browse our books easily with any of the following filters, hover over the filters or their titles to see their descriptions.
Or you can use quick search or switch to advanced search for better results...

The bold new technologies that are reshaping entertainment, medicine, transportation, the military, and other avenues of modern life are examined in the Cutting Edge Technology series. Every book in the series describes the fascinating technologies that are being developed as well as the corresponding changes that are, in some cases, already taking place. Visual chronologies, side bars highlighting intriguing ideas and events, vocabulary terms, and fully documented quotes add depth to the text.

How do doctors use virtual reality? What effect will artificial intelligence have on the future? These questions and more are answered in this high-interest series about the world’s latest technologies. Vibrant photos and levelled text take reluctant readers on a journey through the history, science, uses, and future of each technology.

Get ready to explore robotics, one of the most fascinating demonstrations of STEM in action. Engaging text explores robot design, construction, operation, and competitions. Cool photos and geek-out robot details add to the fun. A hands-on project in each book encourages readers to engage with robotics in their world.

Explore the fascinating details and latest news on the hottest tech topics, including virtual reality, 3D printing, robotics, and more. Photos, screenshots, and accessible text highlight the work of cutting-edge scientists and engineers. Plus, discover what the future might hold for these exciting new technologies.

Cutting-Edge Technology delivers an in-depth look at today's hottest technology trends. Each book explores the science behind the technology, current applications of the technology, potential dangers of the technology, and the future of the technology. This engaging, awe-inspiring series is sure to get readers excited about technology.

In 2013, the FBI started posting a new "Cyber's Most Wanted" list--criminals who have committed serious offenses ranging from hijacking Internet traffic to spying on businesses and governments. Through Cyber Attack, readers will engage in critical thinking to investigate and analyze the ways in which cyber criminals commit their crimes and what's being done to catch them.

Digital technology now connects people to each other and to all the world's information everywhere, at all times. This is changing the way people meet each other, fall in love, find jobs, learn new skills, take in news and entertainment, and build personal identities. Learn what these changes mean for society now and in the future.

The internet helps the world function. However, cyber threats endanger internet users every day. This informative series introduces readers to six of the most alarming cyber threats. Each book provides an accessible overview of a major cyber issue, describing how and why it happens and how people fight it.

Cybertechnology has supercharged traditional crimes and aggressions. It has also enabled new kinds of scams, extortion, and nation-state attacks. Using current events, this book explores crime, espionage, and warfare in cyberspace and how to defend against it.

The news is filled with stories of data breaches at companies and of threats to national security as hackers interfere with elections. It's more important than ever for internet users to know how to maintain their privacy online. The digital world has become inescapable, and to be a responsible digital citizen, it is necessary to be aware of the threats to your online privacy and security. This book looks at the legal and illegal forms of cyberspying, goes behind the scenes to explore career paths in cyberintelligence, and looks at the digital threats of cyber propaganda, fake news, cyberterrorism, and threats to the US government and individuals. Readers will learn tools to keep themselves safe and protect their privacy, as well as tips for what to do if they are attacked online, and a final chapter looks at how digitally savvy teens can prepare for a career in cyberintelligence.