HomeHelpSearchVideo SearchAudio SearchLabel Display ReserveMy AccountLibrary Map
Description Field Ind Field Data
Leader LDR cam a 00
Control # 1 2009007443
Control # Id 3 DLC
Date 5 20231106175404.0
Fixed Data 8 090309s2009 nyu b 001 0 eng
LC Card 10    $a 2009007443
ISBN 20    $a9780824210892 (pbk. : alk. paper)
Local Ctrl # 35    $a(OCoLC)ocn301889903
Obsolete 39    $a250985$cTLC
Cat. Source 40    $aDLC$cDLC$dBTCTA$dEGM$dGVA$dHNW$dIOE$dJYJ$dJAO$dEDX$dC#P$dDLC$dGCG
LC Call 50 00 $aTK5105.875.I57$bI5735 2009
Dewey Class 82 00 $a364.16/8$222
Title 245 00 $aInternet safety /$cedited by Richard Joseph Stein.
Imprint 260    $aNew York :$bH.W. Wilson Co.,$c2009.
Phys Descrpt 300    $aviii, 176 p. ;$c26 cm.
Series:Title 440  0 $aReference shelf
Note:General 500    $aReference shelf volumes present a collection of writings and speeches contemporary to the topic.
Note:Bibliog 504    $aIncludes bibliographical references (p. [163]-173) and index.
Note:Content 505 $aSafety in numbers? an overview of Internet safety -- Viruses, spam, and netbots -- On-line identity theft -- Internet safety for teens and children -- New ways of war: cyberattacks.
Note:Content 505 00 $tImportance of cybersecurity increases as online attacks get more dangerous /$rDaniel Fowler --$tNewly nasty /$rThe economist --$tBrowsers : the new threat landscape /$rAndrew Garcia --$tWeb 2.0 security /$rMarji McClure --$tDeleting your digital past--for good /$rTracy Mayor --$tDead teen's mother : misdemeanor convictions a "stepping stone" in cyberbullying case /$rKim Zetter --$tCyberspace threats and vulnerabilities (excerpted from The national strategy to secure cyberspace) /$rU.S. Department of Homeland Security --$tNational policy and guiding principles (excerpted from The national strategy to secure cyberspace) /$rU.S. Department of Homeland Security --$tMalware, spyware, spamware, beware /$rYan Barcelo --$tBeware the digital zombies /$rJohn Markoff --$tBugging broadband /$rCharles Arthur --$gA$tSlice of apple /$rSeth Colaner --$tOnline identity theft /$rBrigitte Acoca --$tQuestions about online identity theft /$rReid Goldsborough --$tGuard yourself against identity theft on social networks /$rPamela Yip --$tSwiped, stolen and sold /$rThe New York times --$tStartup plans to solve online identity theft, but does anyone care? /$rAlexander Gelfand --$tKids put online safety first /$rMarianne McGee --$tWhen teens turn cyberbullies /$rParis S. Strom,$rRobert D. Strom --$tPatrolling Web 2.0 /$rRobert Losinski -- Sex predator /$rAsra Q. Nomani --$tSurvey finds teens solicit students more than adult predators /$rSchool Violence Alert --$tLori Drew is a meanie /$rEmily Bazelon --$tDecoding MySpace /$rMichelle Andrews --$tOnline photos put hazing in the spotlight /$rStacy A. Teicher --$gThe $tNew e-spionage threat /$rBrian Grow, Keith Epstein,$rChi-Chu Tschang --$tWhen do online attacks cross the line into cyberwar? /$rAlex Kingsbury --$tRussia accused of unleashing cyberwar to disable Estonia /$rIan Traynor --$tIt's cyberwar! /$rMichael Petrou --$gThe$tFlaw at the heart of the Internet /$rErica Naone --$tCybercriminals can't get away with it like they used to /$rJon Swartz --$tCyber-attack operations near /$rDavid A. Fulghum.
Subj:Topical 650  0 $aInternet$xSecurity measures.
Subj:Topical 650  0 $aInternet$xSafety measures.
Subj:Topical 650  0 $aComputer crimes.
Subj:Topical 650  0 $aInternet$xPolitical aspects.
Subj:Topical 650  0 $aComputers and families.
Genre/Form 655  7 $aPrimary sources.$2lcgft
AE:Pers Name 700 $aStein, Richard Joseph.