Computer crimes
Resource Information
The concept Computer crimes represents the subject, aboutness, idea or notion of resources found in Chemeketa Cooperative Regional Library Service (CCRLS).This resource has been enriched with EBSCO NoveList data.
The Resource
Computer crimes
Resource Information
The concept Computer crimes represents the subject, aboutness, idea or notion of resources found in Chemeketa Cooperative Regional Library Service (CCRLS).
This resource has been enriched with EBSCO NoveList data.
- Label
- Computer crimes
106 Items that share the Concept Computer crimes
Context
Context of Computer crimesSubject of
No resources found
No enriched resources found
- A smart kid's guide to Internet privacy
- trueA smart kid's guide to online bullying
- trueAmnesia
- trueArtemis Fowl : The eternity code
- trueBlack nowhere
- trueBlack widow
- trueBlack widow
- trueBrain jack
- trueBreaking and entering : the extraordinary story of a hacker called "Alien"
- trueBreakneck
- trueCome and find me
- Computer security : are we prepared for cyberwar? : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, March 9, 2000
- Computer security : cyber attacks--war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, second session, July 26, 2000
- Convention on Cybercrime : message from the President of the United States transmitting Council of Europe Convention on Cybercrime (the "Cybercrime Convention" or the "Convention"), which was signed by the United States on November 23, 2001
- Council of Europe Convention on Cybercrime (Treaty Doc. 108-11) : report (to accompany Treaty Doc. 108-11)
- trueCowboy Bebop
- trueCyber attack
- trueCyber war : the next threat to national security and what to do about it
- Cyber-bullying : issues and solutions for the school, the classroom and the home
- trueCyber-thief showdown
- CyberShock : surviving hackers, phreakers, identity thieves, Internet terrorists, and weapons of mass disruption
- trueCyberbullying
- trueCyberbullying
- trueCybercrime
- trueCybercriminals
- trueCyberwar : how Russian hackers and trolls helped elect a president : what we don't, can't, and do know
- Cyberwarfare and cyberterrorism : in brief
- trueDark Tomorrow
- trueDarkMarket : cyberthieves, cybercops, and you
- trueDawn of the code war : America's battle against Russia, China, and the rising global cyber threat
- trueDelete all suspects
- trueDon't be evil : how big tech betrayed its founding principles--and all of us
- trueDot.con : the art of scamming a scammer
- trueDuel to the death : an Ali Reynolds novel
- trueEvery crooked path
- Everything you need to know about sextortion
- Everything you need to know about social media : (without having to call a kid)
- trueFade to black
- trueFather night
- trueFuture crimes : everything is connected, everyone is vulnerable and what we can do about it
- trueGhost in the wires : my adventures as the world's most wanted hacker
- trueGunmetal gray
- trueHalting state
- trueHate crimes in cyberspace
- trueHippo eats dwarf : a field guide to hoaxes and other B.S.
- trueHunting Leroux : the inside story if the DEA takedown of a criminal genius and his empire
- ICANN generic top-level domains (gTLD) : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 4, 2011
- trueIce cold heart
- Internet of Things : hearing before the Subcommittee on Courts, Intellectual Property, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Fourteenth Congress, first session, July 29, 2015
- trueInternet security : from concept to consumer
- trueJigsaw
- trueKingdom of lies : unnerving adventures in the world of cybercrime
- trueLove me to death : a novel of suspense
- trueMean behind the screen : what you need to know about cyberbullying
- trueMessing with the enemy : surviving in a social media world of hackers, terrorists, Russians, and fake news
- Net crimes & misdemeanors : outmaneuvering the spammers, swindlers, and stalkers who are targeting you online
- trueNet force : dark web : a novel
- trueNight moves
- No safe harbor : the inside truth about cybercrime -- and how to protect your business
- trueNobody's victim : fighting psychos, stalkers, pervs, and trolls
- trueNow you see me-- : a novel of suspense
- trueOnline bullying
- Online pornography : closing the door on pervasive smut : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, May 6, 2004
- trueOnslaught : the war with China--the opening battle
- trueOverthrow : a novel
- truePill city : how two honor roll students foiled the Feds and built a drug empire
- trueReturn to me : a novel
- trueRule 34
- trueSandworm : a new era of cyberwar and the hunt for the Kremlin's most dangerous hackers
- trueSeal Team Six : hunt the dragon
- trueSeconds to live
- trueShadow ridge
- trueSilenced
- trueSpam nation : the inside story of organized cybercrime--from global epidemic to your front door
- trueSpringboard
- trueState of war
- trueStaying bully-free online
- Terrorist capabilities for cyberattack : overview and policy issues
- trueThe Director : a novel
- trueThe E-mail mystery
- trueThe Exphoria code
- trueThe abduction : a novel
- trueThe abomination : a novel
- trueThe art of invisibility : the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
- trueThe body of David Hayes
- trueThe difference engine
- trueThe fox
- trueThe fox
- trueThe internet police : how crime went online, and the cops followed
- trueThe missing American
- trueThe paladin : a spy novel
- trueThe perfect weapon : war, sabotage, and fear in the cyber age
- trueThe zero hour : a novel
- trueThis machine kills secrets : how WikiLeakers, cypherpunks and hacktivists aim to free the world's information
- trueTom Clancy : true faith and allegiance
- trueTom Clancy's Net force, The Archimedes effect
- trueTools and weapons : the promise and the peril of the digital age
- trueTrackers
- trueWarcross
- trueWarcross, 01
- trueWatch me
- trueWildcard
- trueWords wound : delete cyberbullying and make kindness go viral
- trueWorm : the first digital world war
- trueYou've got male
- trueZap!
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ccrls.org/resource/WfEdj7A_DCw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ccrls.org/resource/WfEdj7A_DCw/">Computer crimes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ccrls.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.ccrls.org/">Chemeketa Cooperative Regional Library Service (CCRLS)</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer crimes
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.ccrls.org/resource/WfEdj7A_DCw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.ccrls.org/resource/WfEdj7A_DCw/">Computer crimes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.ccrls.org/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.ccrls.org/">Chemeketa Cooperative Regional Library Service (CCRLS)</a></span></span></span></span></div>