Refine Your Search
Limit Search Result
Collection
  • (9)
  • (7)
  • (6)
  • (6)
  •  
Subject
  • (1)
  • (1)
  • (1)
  • (1)
  •  
Author
  • (3)
  • (1)
  • (1)
  • (2)
  •  
Series
  • (1)
  • (1)
  • (1)
  • (1)
  •  
Publication Date
Target Audience
  • (20)
  • (19)
  • (6)
  • (5)
  •  
Accelerated Reader
Type of Material
Lexile
Book Adventure
Fountas And Pinnell
Reading Count
Location
  • (23)
  • (11)
  • (6)
  • (4)
  •  
Language
Library
  • (16)
  • (8)
  • (7)
  • (7)
  •  
Availability
Genre
    Search Results: Returned 68 Results, Displaying Titles 1 - 20
    • share link
      -- Handbook of cyber crime investigation
      2017., Oxford University Press Call No: CRIME NF BLA   Edition: 1st ed. published in 2017.    Availability:1 of 1     At Location(s) Summary Note: "... provides ... police practitioners and partners with an operational reference and resource addressing all manner of cyber crime threats, including online anti-social behavior, hate crime, organized cyber crime, fraud, online child exploitation, and cyber terrorism and the terrorist use of the Internet. Presented in three main parts, Part 1 offers an overview of the different types of cyber crime along with explanations of the national structures and strategies in place to combat them, as well as case studies and scenarios. Part 2 offers practical guidance on the different categoriesof cyber crime and features contributions from organizationssuch as the National Crime Agency, and Part 3 covers the key legislation, police powers and points to prove relevant to each key category of offending and is written by the Police National Legal Database"--Amazon.com.
    • share link
      2015., Adolescent, Viking Call No: Sci Fi Fic Ford   Genre: Science Fiction Availability:1 of 1     At Location(s) Summary Note: When his math genius neighbor Ben manages to uncover the key to modern data encryption systems, Robert "Smiles" Smylie comes up with an idea to protect Ben from government agents out to steal the key. But while carrying out his plan, Smiles discovers that his own past may prove the greatest danger to both himself and Ben.
    • share link
      c2006., Mason Crest Publishers Call No: 363.25    Availability:1 of 1     At Location(s) Summary Note: This book helps readers understand how cybercrimes are committed and how investigators help solve these crimes and bring the perpetrators to justice.
    • share link
      [2015]., Adolescent, Twenty-First Century Books Call No: CRIME & PUNISHMENT NF GIL    Availability:1 of 1     At Location(s) Summary Note: Discusses cyber attacks, covering what they are, who commits them, why they are considered criminal, the fight to prevent them, and other related topics.
    • share link
      c2003, Juvenile, Mason Crest Call No: 364.16 8    Availability:1 of 1     At Location(s) Series Title: Crime and detectionSummary Note: Presents an introduction to different types of computer-based crime, and discusses the efforts of law enforcement officials to find and stop cyberspace criminals.
    • share link
      2000., Juvenile, Chelsea House Publishers Call No: 364.16 DEA    Availability:1 of 1     At Location(s) Series Title: Crime, justice, and punishmentSummary Note: Discusses the high tech crimes committed by hackers, crackers, and phone phreaks using computers, including fraud, embezzlement, and espionage, as well as the best ways to minimize the occurrence of such crimes.
    • share link
      2018., Lucent Press Call No: 364.16 KRU    Availability:1 of 1     At Location(s) Summary Note: "The Internet has made it easier than ever for people to connect, but their interactions are not always friendly. Any perceived fault can cause someone to be attacked by a cyber mob, a group of people intent on humiliating someone online. Relatable text addresses this relatively new phenomenon, giving readers information about the rise of cyber mobs, the social and psychological effects on their victims, and ways to combat them. Engaging sidebars provide examples of cyber mob attacks, and a list of resources is provided for anyone who may be experiencing online bullying"--Provided by the publisher.
    • share link
      Juvenile Call No: 364    Availability:1 of 1     At Location(s) Summary Note: Computer networks allow people to easily share information. Organizations and entire cities rely on computer networks. Hackers can break into networks to disrupt systems or steal data. Hacking and other cybercrimes are on the rise. Cybercrime explores common cybercrimes and how people can guard against these threats. Easy-to-read text, vivid images, and helpful back matter give readers a clear look at this subject. Features include a table of contents, infographics, a glossary, additional resources, and an index. Aligned to Common Core Standards and correlated to state standards. Core Library is an imprint of Abdo Publishing, a division of ABDO.