|
|
|
|
Leader |
LDR
|
|
cam a 00 |
Control # |
1
|
|
2009007443 |
Control # Id |
3
|
|
DLC |
Date |
5
|
|
20231106175404.0 |
Fixed Data |
8
|
|
090309s2009 nyu b 001 0 eng |
LC Card |
10
|
|
$a 2009007443 |
ISBN |
20
|
|
$a9780824210892 (pbk. : alk. paper) |
Local Ctrl # |
35
|
|
$a(OCoLC)ocn301889903 |
Obsolete |
39
|
|
$a250985$cTLC |
Cat. Source |
40
|
|
$aDLC$cDLC$dBTCTA$dEGM$dGVA$dHNW$dIOE$dJYJ$dJAO$dEDX$dC#P$dDLC$dGCG |
LC Call |
50
|
00 |
$aTK5105.875.I57$bI5735 2009 |
Dewey Class |
82
|
00 |
$a364.16/8$222 |
Title |
245
|
00 |
$aInternet safety /$cedited by Richard Joseph Stein. |
Imprint |
260
|
|
$aNew York :$bH.W. Wilson Co.,$c2009. |
Phys Descrpt |
300
|
|
$aviii, 176 p. ;$c26 cm. |
Series:Title |
440
|
0 |
$aReference shelf |
Note:General |
500
|
|
$aReference shelf volumes present a collection of writings and speeches contemporary to the topic. |
Note:Bibliog |
504
|
|
$aIncludes bibliographical references (p. [163]-173) and index. |
Note:Content |
505
|
0 |
$aSafety in numbers? an overview of Internet safety -- Viruses, spam, and netbots -- On-line identity theft -- Internet safety for teens and children -- New ways of war: cyberattacks. |
Note:Content |
505
|
00 |
$tImportance of cybersecurity increases as online attacks get more dangerous /$rDaniel Fowler --$tNewly nasty /$rThe economist --$tBrowsers : the new threat landscape /$rAndrew Garcia --$tWeb 2.0 security /$rMarji McClure --$tDeleting your digital past--for good /$rTracy Mayor --$tDead teen's mother : misdemeanor convictions a "stepping stone" in cyberbullying case /$rKim Zetter --$tCyberspace threats and vulnerabilities (excerpted from The national strategy to secure cyberspace) /$rU.S. Department of Homeland Security --$tNational policy and guiding principles (excerpted from The national strategy to secure cyberspace) /$rU.S. Department of Homeland Security --$tMalware, spyware, spamware, beware /$rYan Barcelo --$tBeware the digital zombies /$rJohn Markoff --$tBugging broadband /$rCharles Arthur --$gA$tSlice of apple /$rSeth Colaner --$tOnline identity theft /$rBrigitte Acoca --$tQuestions about online identity theft /$rReid Goldsborough --$tGuard yourself against identity theft on social networks /$rPamela Yip --$tSwiped, stolen and sold /$rThe New York times --$tStartup plans to solve online identity theft, but does anyone care? /$rAlexander Gelfand --$tKids put online safety first /$rMarianne McGee --$tWhen teens turn cyberbullies /$rParis S. Strom,$rRobert D. Strom --$tPatrolling Web 2.0 /$rRobert Losinski -- Sex predator /$rAsra Q. Nomani --$tSurvey finds teens solicit students more than adult predators /$rSchool Violence Alert --$tLori Drew is a meanie /$rEmily Bazelon --$tDecoding MySpace /$rMichelle Andrews --$tOnline photos put hazing in the spotlight /$rStacy A. Teicher --$gThe $tNew e-spionage threat /$rBrian Grow, Keith Epstein,$rChi-Chu Tschang --$tWhen do online attacks cross the line into cyberwar? /$rAlex Kingsbury --$tRussia accused of unleashing cyberwar to disable Estonia /$rIan Traynor --$tIt's cyberwar! /$rMichael Petrou --$gThe$tFlaw at the heart of the Internet /$rErica Naone --$tCybercriminals can't get away with it like they used to /$rJon Swartz --$tCyber-attack operations near /$rDavid A. Fulghum. |
Subj:Topical |
650
|
0 |
$aInternet$xSecurity measures. |
Subj:Topical |
650
|
0 |
$aInternet$xSafety measures. |
Subj:Topical |
650
|
0 |
$aComputer crimes. |
Subj:Topical |
650
|
0 |
$aInternet$xPolitical aspects. |
Subj:Topical |
650
|
0 |
$aComputers and families. |
Genre/Form |
655
|
7 |
$aPrimary sources.$2lcgft |
AE:Pers Name |
700
|
1 |
$aStein, Richard Joseph. |