A Critical Handbook of Children's LiteratureDIANE Publishing, 1998 - 309 pages A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, library, or home. The Handbook analyzes children's books that showcase positive examples of the literary elements, formats, and genres that are the focus in the field of children's literature. The books are noteworthy children's books, from classics to favorites to just-published titles, all selected as thought-provoking, important, or motivating choices. The authors suggest that readers examine the Handbook and then apply the literary concepts to additional reading from today's ever-expanding selection of children's books. |
À l'intérieur du livre
Résultats 1-5 sur 70
Page xvii
... computer operations method by which higher level language programs or jobs ... services . MLS ( Multi - Level Security ) : Confidential , secret , and top ... computer and an analog communication circuit . MONITOR : Unit in large ...
... computer operations method by which higher level language programs or jobs ... services . MLS ( Multi - Level Security ) : Confidential , secret , and top ... computer and an analog communication circuit . MONITOR : Unit in large ...
Page xviii
... services as objects for exploration and exploitation . PIGGYBACKING ( also ... computer system terminal user to gain access to a ... computer . SCANNING : The process of presenting sequentially changing information to xviii Computer Crime.
... services as objects for exploration and exploitation . PIGGYBACKING ( also ... computer system terminal user to gain access to a ... computer . SCANNING : The process of presenting sequentially changing information to xviii Computer Crime.
Page xix
... computer intrusion . SCAVENGING : A covert , unauthorized method of ob- taining information that may be left in or ... services . The name derives from an IBM utility program called " Superzap . " SYSTEM ENGINEER : A person who designs , con- ...
... computer intrusion . SCAVENGING : A covert , unauthorized method of ob- taining information that may be left in or ... services . The name derives from an IBM utility program called " Superzap . " SYSTEM ENGINEER : A person who designs , con- ...
Page 3
... computer terminal , the funds transfer would not be a computer crime . No fraudulent act was related directly to a ... services . • By the role played by computers : object of attack , unique environment and forms of assets produced , ...
... computer terminal , the funds transfer would not be a computer crime . No fraudulent act was related directly to a ... services . • By the role played by computers : object of attack , unique environment and forms of assets produced , ...
Page 9
... computer abuse methods in which computers play a key role . Although several of the methods are far more complex than the nonexpert will understand in detail , these brief descriptions should help investigators and prosecutors ...
... computer abuse methods in which computers play a key role . Although several of the methods are far more complex than the nonexpert will understand in detail , these brief descriptions should help investigators and prosecutors ...
Autres éditions - Tout afficher
Expressions et termes fréquents
acts application programs audit auditor authorized backup cess computer abuse computer crime laws computer network computer operations computer programs computer security computer services computer storage computer system copies court criminal damage data base data center data communications data entry data files data processing defendant defined designed detection developed device disk diskette documentation electronic employee engineer equipment evidence executed facilities federal felony functions grams identified input instructions internal investigators larceny logic bombs loss magnetic tape mainframe computer manager methods munications obtained offense on-line on-line systems operating system organizations output password payroll pen register perform perpetrators person personal computer printouts procedures production prosecution prosecutors puter records reports Stat storage stored suspect System programmer technical techniques telephone theft time-sharing tion trade secrets transaction Trojan horse U.S.C. Sect unauthorized United violations vulnerability
Fréquemment cités
Page 147 - This section shall not be construed to preclude the applicability of any other provision of the criminal law...
Page 109 - Comment at 71, it is a crime for two or more persons to conspire to (commit any offense or) defraud the United States. This leads to an anomaly: the planning of an act, not criminal in itself, may be a crime. The implications for software abuse are enormous. The broad scope of what it means to "defraud" the United States can be seen in the leading case in this area, Haas v.
Page 150 - financial record" means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution; (6) the term "exceeds authorized access" means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter; (7) the term "department of the United States...
Page 149 - ... or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection...
Page 149 - ... of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects...
Page 100 - literary works' does not connote any criterion of literary merit or qualitative value: it includes catalogs, directories, and similar factual, reference, or instructional works and compilations of data. It also includes computer data bases, and computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves.
Page 97 - As used in this section (1) the term "computer" means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device...
Page 104 - stolen" as used in the crime of interstate transportation of stolen motor vehicles includes all felonious takings of motor vehicles with the intent to deprive the owner of the rights and benefits of ownership.
Page 148 - Whoever, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation...
Page 7 - For the purpose of this paper, the term will be defined as an illegal act or series of illegal acts committed by nonphysical means and by concealment or guile, to obtain money or property, to avoid the payment or loss of money or property, or to obtain business or personal advantage.