Introduction

class="introduction" class="key-equations" title="Key Equations" class="key-concepts" title="Key Concepts" class="review-exercises" title="Review Exercises" class="practice-test" title="Practice Test" class="try" class="quick-check" class="section-exercises"

A photo of lines of code on a computer terminal screen.

A strange charge suddenly appears on your credit card. But your card is in your wallet—it’s not even lost or stolen. Sadly, you may have been a victim of cyber crime. In this day and age, most transactions take advantage of the benefit of computers in some way. Cyber crime is any type of crime that uses a computer or computer network. Thankfully, many people are working to prevent cyber crime. Sometimes known as cryptographers, these people develop complex patterns in computer codes that block access to would-be thieves as well as write codes to intercept and decode information from them so that they may be identified. In this chapter, you will explore basic sequences and series related to those used by computer programmers to prevent cyber crime.


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

You can also download for free at http://cnx.org/contents/02776133-d49d-49cb-bfaa-67c7f61b25a1@4.13

Attribution: