Refine Your Search
Limit Search Result
Collection
  • (4)
  • (2)
  • (2)
  • (1)
  •  
Subject
  • (4)
  • (15)
  • (1)
  • (1)
  •  
Author
  • (1)
  • (5)
  • (1)
  • (1)
  •  
Series
  • (1)
  • (1)
  • (1)
  • (2)
  •  
Publication Date
Target Audience
  • (5)
  • (3)
  • (1)
  • (1)
  •  
Accelerated Reader
Type of Material
  • (7)
  • (6)
  • (1)
  •  
Lexile
Book Adventure
Fountas And Pinnell
Reading Count
Location
  • (3)
  • (2)
  •  
Language
Library
  • (6)
  • (2)
  • (2)
  • (2)
  •  
Availability
Genre
    Search Results: Returned 18 Results, Displaying Titles 1 - 18
    • share link
      [2015]., Adolescent, Twenty-First Century Books Call No: CRIME & PUNISHMENT NF GIL    Availability:1 of 1     At Location(s) Summary Note: Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.
    • share link
      2018., Lucent Press Call No: 364.16 KRU    Availability:1 of 1     At Location(s) Summary Note: "The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob, a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide examples of cyber mob attacks, and a list of resources is provided for anyone who may be experiencing online bullying"--Provided by the publisher.
    • share link
      [2019]., Adolescent, ReferencePoint Press Call No: 364.14 HUL    Availability:1 of 1     At Location(s) Series Title: STEM careers (ReferencePoint Press)Summary Note: "Digital devices such as cell phones, laptops, smart watches, fitness trackers, and more connect the world together and make life more convenient. Many people have become so dependent on digital technology that they could not conduct their business or manage their daily lives without it. They sleep with smart phones by their pillows, as if the device were an extension of the body. The more people rely on technology, however, the more vulnerable they become to data breaches or technology failures"--Provided by publisher.
    • share link
      [2016], Pre-adolescent, 45th Parallel Press, an imprint of Cherry Lake Pub. Call No: 005.8    Availability:1 of 1     At Location(s) Summary Note: Provides information on computer hacking and hacking as a career in the security department of a company or government agency.
    • share link
      c2012., Heinemann Library Call No: 005.8    Availability:1 of 1     At Location(s) Series Title: Hot topicsSummary Note: Explains the dangers and risks of using the Internet and how you can protect yourself.
    • share link
      c2007., Greenhaven Press Call No: 364.16 DAN    Availability:1 of 1     At Location(s)Table of contents Series Title: At issue.   Volume: Mass mediaSummary Note: Essays from various sources provide a wide range of opinions on policing the Internet, discussing monitoring of teenagers, government regulations, cyberterrorism, identity theft, pornography, social networking sites, and cyberbullying.