-
-
c2013., Gareth Stevens Pub Call No: 613.6 Edition: 1st ed. Availability:1 of 1 At Location(s)View cover image provided by Mackin Series Title: Cyberspace survival guideSummary Note: Provides information and advice about online hoaxes, discussing how to avoid, identify, and remove them, in addition to other related topics.
-
-
2013., Juvenile, Gareth Stevens Pub. Call No: 005.8 SHE Edition: 1st ed. Availability:1 of 1 At Location(s) Series Title: Cyberspace survival guideSummary Note: Presents advice on how to detect and avoid online hoaxes.
-
-
2012., Juvenile, PowerKids Press Call No: 004.67 8 083 Edition: 1st ed. Click here to read this ebook provided by OCM SLS Summary Note: This book, with sidebars highlighting the finer points of the discussion, explains how to avoid predators and what steps to take if readers are targeted by online predators.
-
-
2012., Juvenile, PowerKids Press Call No: 004.67 8 083 Edition: 1st ed. Click here to read this ebook provided by OCM SLS Summary Note: This book, with sidebars highlighting the finer points of the discussion, explains how to avoid predators and what steps to take if readers are targeted by online predators.
-
-
2012., Juvenile, PowerKids Press Call No: 004.67 8 083 Edition: 1st ed. Click here to read this ebook provided by OCM SLS Summary Note: This book, with sidebars highlighting the finer points of the discussion, explains how to avoid predators and what steps to take if readers are targeted by online predators.
-
-
2012., Juvenile, PowerKids Press Call No: 004.67 8 083 Edition: 1st ed. Click here to read this ebook provided by OCM SLS Summary Note: This book, with sidebars highlighting the finer points of the discussion, explains how to avoid predators and what steps to take if readers are targeted by online predators.
-
-
-- Handbook of cyber crime investigation2017., Oxford University Press Call No: CRIME NF BLA Edition: 1st ed. published in 2017. Availability:1 of 1 At Location(s) Summary Note: "... provides ... police practitioners and partners with an operational reference and resource addressing all manner of cyber crime threats, including online anti-social behavior, hate crime, organized cyber crime, fraud, online child exploitation, and cyber terrorism and the terrorist use of the Internet. Presented in three main parts, Part 1 offers an overview of the different types of cyber crime along with explanations of the national structures and strategies in place to combat them, as well as case studies and scenarios. Part 2 offers practical guidance on the different categoriesof cyber crime and features contributions from organizationssuch as the National Crime Agency, and Part 3 covers the key legislation, police powers and points to prove relevant to each key category of offending and is written by the Police National Legal Database"--Amazon.com.
-
-
2015., Adolescent, Viking Call No: Sci Fi Fic Ford Genre: Science Fiction Availability:1 of 1 At Location(s) Summary Note: When his math genius neighbor Ben manages to uncover the key to modern data encryption systems, Robert "Smiles" Smylie comes up with an idea to protect Ben from government agents out to steal the key. But while carrying out his plan, Smiles discovers that his own past may prove the greatest danger to both himself and Ben.
-
-
2018., Pre-adolescent, PowerKids Press Call No: 005.8 Harris Edition: First edition. Availability:1 of 1 At Location(s) Series Title: Spotlight on kids can code.Summary Note: Learn about digital security and how to keep your information safe.
-
-
2000., Juvenile, Enslow Publishers Call No: 364.16 JUD Edition: Rev. ed. Availability:1 of 1 At Location(s) Series Title: Issues in focusSummary Note: Describes different computer crimes, including hacking, computer fraud, viruses, and Internet scams, discussing the methods used to commit them and penalties for those who are caught.
-
-
c2006., Mason Crest Publishers Call No: 363.25 Availability:1 of 1 At Location(s) Summary Note: This book helps readers understand how cybercrimes are committed and how investigators help solve these crimes and bring the perpetrators to justice.
-
-
2006., Mason Crest Publishers Call No: 364.16 BAU Availability:1 of 1 At Location(s) Series Title: Forensics, the science of crime-solvingSummary Note: This book helps readers understand how cybercrimes are committed and how investigators help solve these crimes and bring the perpetrators to justice.
-
-
c2006., Mason Crest Publishers Call No: 363.25 Availability:1 of 1 At Location(s)Table of contents Series Title: Forensics, the science of crime-solvingSummary Note: Describes how criminal investigators solve cybercrimes, bring criminals to justice, and offers tips for protecting one's computer online and from intrusions and hackers.
-
-
[2015]., Adolescent, Twenty-First Century Books Call No: CRIME & PUNISHMENT NF GIL Availability:1 of 1 At Location(s) Summary Note: Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.
-
-
2008., Routledge Call No: 371.5 8 Availability:1 of 1 At Location(s) Summary Note: A comprehensive overview of cyberbullying that discusses what it is; different types of bullying; its relevance in various countries, such as Japan, China, the United Kingdom, and the United States; policies; privacy and safety in cyberspace; and other related topics.
-
-
c2008., Pre-adolescent, Cherry Lake Pub. Call No: 363.25 Availability:1 of 1 At Location(s)Table of contents only Series Title: 21st century skills library. Cool science careersSummary Note: Explains the "cyber cop", who works to protect us from cyber crimes linked to modern electronics.
-
-
c2003, Juvenile, Mason Crest Call No: 364.16 8 Availability:1 of 1 At Location(s) Series Title: Crime and detectionSummary Note: Presents an introduction to different types of computer-based crime, and discusses the efforts of law enforcement officials to find and stop cyberspace criminals.
-
-
2000., Juvenile, Chelsea House Publishers Call No: 364.16 DEA Availability:1 of 1 At Location(s) Series Title: Crime, justice, and punishmentSummary Note: Discusses the high tech crimes committed by hackers, crackers, and phone phreaks using computers, including fraud, embezzlement, and espionage, as well as the best ways to minimize the occurrence of such crimes.
-
-
2018., Lucent Press Call No: 364.16 KRU Availability:1 of 1 At Location(s) Summary Note: "The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob, a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide examples of cyber mob attacks, and a list of resources is provided for anyone who may be experiencing online bullying"--Provided by the publisher.
-
-
Juvenile Call No: 364 Availability:1 of 1 At Location(s) Summary Note: Computer networks allow people to easily share information. Organizations and entire cities rely on computer networks. Hackers can break into networks to disrupt systems or steal data. Hacking and other cybercrimes are on the rise. Cybercrime explores common cybercrimes and how people can guard against these threats. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.