A Critical Handbook of Children's LiteratureDIANE Publishing, 1998 - 309 pages A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, library, or home. The Handbook analyzes children's books that showcase positive examples of the literary elements, formats, and genres that are the focus in the field of children's literature. The books are noteworthy children's books, from classics to favorites to just-published titles, all selected as thought-provoking, important, or motivating choices. The authors suggest that readers examine the Handbook and then apply the literary concepts to additional reading from today's ever-expanding selection of children's books. |
À l'intérieur du livre
Résultats 1-5 sur 100
Page iii
... assist law enforcement and prosecutorial efforts to meet the challenges they face combating crime in the computer age . James K. Stewart Director PREFACE The original Criminal Justice Resource Manual on Com- puter Foreword iii.
... assist law enforcement and prosecutorial efforts to meet the challenges they face combating crime in the computer age . James K. Stewart Director PREFACE The original Criminal Justice Resource Manual on Com- puter Foreword iii.
Page xi
... puter crime has become a mature subject of interest to a criminal justice community that must cope with 48 state and two federal statutes defining computer crime offenses . The manual is written as both a training and reference guide ...
... puter crime has become a mature subject of interest to a criminal justice community that must cope with 48 state and two federal statutes defining computer crime offenses . The manual is written as both a training and reference guide ...
Page xiii
... puter program instructions written in assembly language into machine language . ASSEMBLY LANGUAGE : A source language that in- cludes symbolic machine language statements . ASYNCHRONOUS ATTACK : Taking advantage of an operating system ...
... puter program instructions written in assembly language into machine language . ASSEMBLY LANGUAGE : A source language that in- cludes symbolic machine language statements . ASYNCHRONOUS ATTACK : Taking advantage of an operating system ...
Page xiv
... puter instructions not available for normal programming . The name is derived from other jargon terms ( software and hardware ) . FORTRAN ( FORmula TRANslation ) : A higher level programming language primarily used to write computer ...
... puter instructions not available for normal programming . The name is derived from other jargon terms ( software and hardware ) . FORTRAN ( FORmula TRANslation ) : A higher level programming language primarily used to write computer ...
Page xvi
... puter instructions not available for normal programming . The name is derived from other jargon terms ( software and hardware ) . FORTRAN ( FORmula TRANslation ) : A higher level programming language primarily used to write computer ...
... puter instructions not available for normal programming . The name is derived from other jargon terms ( software and hardware ) . FORTRAN ( FORmula TRANslation ) : A higher level programming language primarily used to write computer ...
Autres éditions - Tout afficher
Expressions et termes fréquents
acts application programs audit auditor authorized backup cess computer abuse computer crime laws computer network computer operations computer programs computer security computer services computer storage computer system copies court criminal damage data base data center data communications data entry data files data processing defendant defined designed detection developed device disk diskette documentation electronic employee engineer equipment evidence executed facilities federal felony functions grams identified input instructions internal investigators larceny logic bombs loss magnetic tape mainframe computer manager methods munications obtained offense on-line on-line systems operating system organizations output password payroll pen register perform perpetrators person personal computer printouts procedures production prosecution prosecutors puter records reports Stat storage stored suspect System programmer technical techniques telephone theft time-sharing tion trade secrets transaction Trojan horse U.S.C. Sect unauthorized United violations vulnerability
Fréquemment cités
Page 147 - This section shall not be construed to preclude the applicability of any other provision of the criminal law...
Page 109 - Comment at 71, it is a crime for two or more persons to conspire to (commit any offense or) defraud the United States. This leads to an anomaly: the planning of an act, not criminal in itself, may be a crime. The implications for software abuse are enormous. The broad scope of what it means to "defraud" the United States can be seen in the leading case in this area, Haas v.
Page 150 - financial record" means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution; (6) the term "exceeds authorized access" means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter; (7) the term "department of the United States...
Page 149 - ... or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection...
Page 149 - ... of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects...
Page 100 - literary works' does not connote any criterion of literary merit or qualitative value: it includes catalogs, directories, and similar factual, reference, or instructional works and compilations of data. It also includes computer data bases, and computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves.
Page 97 - As used in this section (1) the term "computer" means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device...
Page 104 - stolen" as used in the crime of interstate transportation of stolen motor vehicles includes all felonious takings of motor vehicles with the intent to deprive the owner of the rights and benefits of ownership.
Page 148 - Whoever, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation...
Page 7 - For the purpose of this paper, the term will be defined as an illegal act or series of illegal acts committed by nonphysical means and by concealment or guile, to obtain money or property, to avoid the payment or loss of money or property, or to obtain business or personal advantage.