Computer crimes -- Juvenile literature
Label
Computer crimes -- Juvenile literature
Name
Computer crimes
Focus
Sub focus
Actions
Incoming Resources
- Subject of34
- Hacked, M. G. Higgins
- Words wound, delete cyberbullying and make kindness go viral, Justin W. Patchin and Sameer Hinduja
- Cyber crimes, Gina De Angelis ; Austin Sarat, general editor
- Computer crime, phreaks, spies, and salami slicers, [by] Karen Judson
- Cybercrime, Noah Berlatsky, book editor
- Underworld, criminals in action, Anita Croy
- Cybercrime, data trails do tell tales, Sara L. Latta
- Cyber crime secrets, John Townsend
- What are the dangers of online scams?, by John Allen
- Words wound, delete cyberbullying and make kindness go viral, by Justin W. Patchin, Ph.D., and Sameer Hinduja, Ph.D
- Cyber attack, Martin Gitlin and Margaret J. Goldstein
- The Dark Web, Sue Bradford Edwards ; content consultant, M.E. Kabay
- Cyberterrorism and ransomware attacks, Gary Wiener, book editor
- Online identity and privacy, 12 things you need to know, by Jill Roesler
- Internet security, from concept to consumer, by Nel Yomtov
- Computer crime, phreaks, spies, and salami slicers, Karen Judson
- Cybercrime, by Kevin Hile
- Cybercriminals, Wil Mara
- Cyber attacks, counterattacks, and espionage, Daniel E. Harmon
- Teen cyberbullying investigated, where do your rights end and consequences begin?, Tom Jacobs
- The internet, Gary Wiener, book editor
- Cybercrime, by Heather C. Hudak ; content consultant, M.E. Kabay
- Virtual danger, staying safe online, by Anne K. Brown
- How serious a problem is computer hacking?, Patricia D. Netzley
- Digital cryptology, Rachael L. Thomas
- Digital forensics, Valerie Bodden
- Cybercrime, by Heather C. Hudak ; content consultant, M.E. Kabay
- Computer investigation, Elizabeth Bauchner
- Top secret science in cybercrime and espionage, Ellen Rodger
- Cyber crime, Andrew Grant-Adamson; foreword by Manny Gomez, Esq
- Online security, Carla Mooney
- Everything you need to know about sextortion, Avery Elizabeth Hurt
- Computer hacking, by Peggy J. Parks
- Protect your data and identity online, by A. R. Carser
Outgoing Resources
- Focus1
- Sub focus1