A Critical Handbook of Children's LiteratureDIANE Publishing, 1998 - 309 pages A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, library, or home. The Handbook analyzes children's books that showcase positive examples of the literary elements, formats, and genres that are the focus in the field of children's literature. The books are noteworthy children's books, from classics to favorites to just-published titles, all selected as thought-provoking, important, or motivating choices. The authors suggest that readers examine the Handbook and then apply the literary concepts to additional reading from today's ever-expanding selection of children's books. |
À l'intérieur du livre
Résultats 1-5 sur 67
Page vi
... Obtaining Evidence 3. Personal Computer Crime Investigation . 4. Computer Reports as Evidence .. .63 .63 .64 ..65 .66 .66 .66 .68 .68 5. Caring for Evidence 6. Privacy and Secrecy of Evidence .72 73 7. Conjectural Forensics C ...
... Obtaining Evidence 3. Personal Computer Crime Investigation . 4. Computer Reports as Evidence .. .63 .63 .64 ..65 .66 .66 .66 .68 .68 5. Caring for Evidence 6. Privacy and Secrecy of Evidence .72 73 7. Conjectural Forensics C ...
Page xvii
... obtain the data to merge with and update a master file . MEMORY : See MAIN STORAGE . MICR ( Magnetic Ink Character Recognition ) : A stan- dard machine - readable type font printed with magnetic ink on documents such as bank checks and ...
... obtain the data to merge with and update a master file . MEMORY : See MAIN STORAGE . MICR ( Magnetic Ink Character Recognition ) : A stan- dard machine - readable type font printed with magnetic ink on documents such as bank checks and ...
Page 6
... obtained at that time has been used as the basis for parts of this manual . This revision of the manual , which is bas- ed on experience and studies occurring since 1979 , incor- porates results of a 1985 telephone survey of 100 pro ...
... obtained at that time has been used as the basis for parts of this manual . This revision of the manual , which is bas- ed on experience and studies occurring since 1979 , incor- porates results of a 1985 telephone survey of 100 pro ...
Page 7
... obtain money or proper- ty , to avoid the payment of loss of money or property , or to obtain personal or business advantage . " Congress adopted this definition in 1979 in the Justice System Ad- ministration Improvement Act . 2 ...
... obtain money or proper- ty , to avoid the payment of loss of money or property , or to obtain personal or business advantage . " Congress adopted this definition in 1979 in the Justice System Ad- ministration Improvement Act . 2 ...
Page 10
... obtaining evidence require that investigators observe the acts and capture equipment . Eavesdropping should be assumed to be the least likely method used in the theft or modification of data . Detec- tion methods and possible evidence ...
... obtaining evidence require that investigators observe the acts and capture equipment . Eavesdropping should be assumed to be the least likely method used in the theft or modification of data . Detec- tion methods and possible evidence ...
Autres éditions - Tout afficher
Expressions et termes fréquents
acts application programs audit auditor authorized backup cess computer abuse computer crime laws computer network computer operations computer programs computer security computer services computer storage computer system copies court criminal damage data base data center data communications data entry data files data processing defendant defined designed detection developed device disk diskette documentation electronic employee engineer equipment evidence executed facilities federal felony functions grams identified input instructions internal investigators larceny logic bombs loss magnetic tape mainframe computer manager methods munications obtained offense on-line on-line systems operating system organizations output password payroll pen register perform perpetrators person personal computer printouts procedures production prosecution prosecutors puter records reports Stat storage stored suspect System programmer technical techniques telephone theft time-sharing tion trade secrets transaction Trojan horse U.S.C. Sect unauthorized United violations vulnerability
Fréquemment cités
Page 147 - This section shall not be construed to preclude the applicability of any other provision of the criminal law...
Page 109 - Comment at 71, it is a crime for two or more persons to conspire to (commit any offense or) defraud the United States. This leads to an anomaly: the planning of an act, not criminal in itself, may be a crime. The implications for software abuse are enormous. The broad scope of what it means to "defraud" the United States can be seen in the leading case in this area, Haas v.
Page 150 - financial record" means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution; (6) the term "exceeds authorized access" means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter; (7) the term "department of the United States...
Page 149 - ... or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection...
Page 149 - ... of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects...
Page 100 - literary works' does not connote any criterion of literary merit or qualitative value: it includes catalogs, directories, and similar factual, reference, or instructional works and compilations of data. It also includes computer data bases, and computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves.
Page 97 - As used in this section (1) the term "computer" means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device...
Page 104 - stolen" as used in the crime of interstate transportation of stolen motor vehicles includes all felonious takings of motor vehicles with the intent to deprive the owner of the rights and benefits of ownership.
Page 148 - Whoever, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation...
Page 7 - For the purpose of this paper, the term will be defined as an illegal act or series of illegal acts committed by nonphysical means and by concealment or guile, to obtain money or property, to avoid the payment or loss of money or property, or to obtain business or personal advantage.