The document discusses various types of computer crimes including crimes committed by insiders, hackers, viruses, pedophiles, and different techniques such as data diddling, trojan horses, salami slicing, and scavenging. It provides examples of computer crimes that have occurred and outlines the methods, impacts, and challenges of detecting and prosecuting computer crimes.