A Critical Handbook of Children's LiteratureDIANE Publishing, 1998 - 309 pages A Critical Handbook of Children's Literature, Ninth Edition, gives future teachers, practicing teachers, librarians, and parents many examples of quality children's literature to guide them in choosing the best books for the classroom, library, or home. The Handbook analyzes children's books that showcase positive examples of the literary elements, formats, and genres that are the focus in the field of children's literature. The books are noteworthy children's books, from classics to favorites to just-published titles, all selected as thought-provoking, important, or motivating choices. The authors suggest that readers examine the Handbook and then apply the literary concepts to additional reading from today's ever-expanding selection of children's books. |
À l'intérieur du livre
Résultats 1-5 sur 40
Page iii
... theft such as embezzlement and fraud ; increasingly , drug rings , prostitution rings , child pornographers and pedophiles have turned to computers to facilitate their illicit operations just as legitimate businesses do . Police say ...
... theft such as embezzlement and fraud ; increasingly , drug rings , prostitution rings , child pornographers and pedophiles have turned to computers to facilitate their illicit operations just as legitimate businesses do . Police say ...
Page vii
... Theft by Deceit 4. Forgery 5. Obliteration or Bugging of Programs 6. Misappropriation of Programs 7. Trade Secrets ... 8. Privacy Invasions Federal Penal Laws 1. Computer Fraud and Abuse Act of 1986 . . . 2. Electronic Communications ...
... Theft by Deceit 4. Forgery 5. Obliteration or Bugging of Programs 6. Misappropriation of Programs 7. Trade Secrets ... 8. Privacy Invasions Federal Penal Laws 1. Computer Fraud and Abuse Act of 1986 . . . 2. Electronic Communications ...
Page 2
... theft , larceny , embezzlement , bribery , burglary , sabotage , espionage , conspiracy , extortion , at- tempted murder , manslaughter , pornography , trespassing , violation of privacy , and kidnapping . Criminal justice agencies ...
... theft , larceny , embezzlement , bribery , burglary , sabotage , espionage , conspiracy , extortion , at- tempted murder , manslaughter , pornography , trespassing , violation of privacy , and kidnapping . Criminal justice agencies ...
Page 3
... theft , robbery , larceny , ar- son , embezzlement , extortion , conspiracy , sabotage , espionage , and more . By modi operandi : physical attacks , false data entry , superzapping , impersonation , wire tapping , pig- gybacking ...
... theft , robbery , larceny , ar- son , embezzlement , extortion , conspiracy , sabotage , espionage , and more . By modi operandi : physical attacks , false data entry , superzapping , impersonation , wire tapping , pig- gybacking ...
Page 10
... theft or modification of data . Detec- tion methods and possible evidence will be the same as in the investigation of voice communication wiretapping . Table 1 summarizes the potential perpetrators , detection , and evidence in ...
... theft or modification of data . Detec- tion methods and possible evidence will be the same as in the investigation of voice communication wiretapping . Table 1 summarizes the potential perpetrators , detection , and evidence in ...
Autres éditions - Tout afficher
Expressions et termes fréquents
acts application programs audit auditor authorized backup cess computer abuse computer crime laws computer network computer operations computer programs computer security computer services computer storage computer system copies court criminal damage data base data center data communications data entry data files data processing defendant defined designed detection developed device disk diskette documentation electronic employee engineer equipment evidence executed facilities federal felony functions grams identified input instructions internal investigators larceny logic bombs loss magnetic tape mainframe computer manager methods munications obtained offense on-line on-line systems operating system organizations output password payroll pen register perform perpetrators person personal computer printouts procedures production prosecution prosecutors puter records reports Stat storage stored suspect System programmer technical techniques telephone theft time-sharing tion trade secrets transaction Trojan horse U.S.C. Sect unauthorized United violations vulnerability
Fréquemment cités
Page 147 - This section shall not be construed to preclude the applicability of any other provision of the criminal law...
Page 109 - Comment at 71, it is a crime for two or more persons to conspire to (commit any offense or) defraud the United States. This leads to an anomaly: the planning of an act, not criminal in itself, may be a crime. The implications for software abuse are enormous. The broad scope of what it means to "defraud" the United States can be seen in the leading case in this area, Haas v.
Page 150 - financial record" means information derived from any record held by a financial institution pertaining to a customer's relationship with the financial institution; (6) the term "exceeds authorized access" means to access a computer with authorization and to use such access to obtain or alter information in the computer that the accesser is not entitled so to obtain or alter; (7) the term "department of the United States...
Page 149 - ... or an attempt to commit an offense punishable under this subparagraph; and (B) a fine under this title or imprisonment for not more than ten years, or both, in the case of an offense under subsection...
Page 149 - ... of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects...
Page 100 - literary works' does not connote any criterion of literary merit or qualitative value: it includes catalogs, directories, and similar factual, reference, or instructional works and compilations of data. It also includes computer data bases, and computer programs to the extent that they incorporate authorship in the programmer's expression of original ideas, as distinguished from the ideas themselves.
Page 97 - As used in this section (1) the term "computer" means an electronic, magnetic, optical, electrochemical, or other high speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device, but such term does not include an automated typewriter or typesetter, a portable hand held calculator, or other similar device...
Page 104 - stolen" as used in the crime of interstate transportation of stolen motor vehicles includes all felonious takings of motor vehicles with the intent to deprive the owner of the rights and benefits of ownership.
Page 148 - Whoever, with intent or reason to believe that it is to be used to the injury of the United States or to the advantage of a foreign nation...
Page 7 - For the purpose of this paper, the term will be defined as an illegal act or series of illegal acts committed by nonphysical means and by concealment or guile, to obtain money or property, to avoid the payment or loss of money or property, or to obtain business or personal advantage.