Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Child protection and online predators
Confronting Cruelty by Investigates the history of the detection and treatment of child abuse through the lens of the Children's Protection Society from 1896 to the end of the 20th century. The text explores the inner world of the organization within history and the changes in law and the social constructions of abuse.
Call Number: 346.9304 COL
Publication Date: 2002-04-01
Cyber crime and cyber terrorism
Cyber Wars by
Call Number: 364.18 ART
Publication Date: 2018
Hacking Happiness by An issues book highlighting the benefits of an examined life in the digital world, this timely work takes the trepidation out of the technological renaissance and illustrates how the fruits of the Information Age can improve our lives for a happier humanity.
Publication Date: 2015-03-10
Internet e-mail fraud by The Internet is a marvelous place, where information passes, important data is collected and people find kinship with other of similar mind. When the intended purpose goes awry, as is does when people receive messages they don not wont or which hurt them in a number of ways, then the value of the Internet is significantly diminished.
Call Number: 363.25 TIE
Publication Date: 2013
Hacking for Dummies® by The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.
Publication Date: 2013-01-29
Digital Security by Since the advent of widespread Internet use, digital technology has been used for criminal intent. From computer viruses capable of shutting down and destroying infected computers to recruiting members online for hate groups, the ways the Internet can be used for nefarious purposes is practically limitless. But there is hope. Those in the digital industry are working to increase safeguards from cyber terrorists, such as heading off viruses before they can infect computers, and increasing cyber security. Digital Security: Cyber Terror and Cyber Security describes how computers are used both to commit crimes and to prevent them and concludes with a discussion of the future of digital crime and stopping its spread.
Identity theft and privacy
Privacy in a Digital, Networked World by Computers - Security measures
Information management - Law and legislation
Internet (Computer network) - Social aspects
Privacy, Right of - Security measures
Call Number: 302.23 ZEA
Publication Date: 2015-10-23
Identity theft protection by Identity Theft Protection: Easy Ways to Secure Your Finances and Protect Your Identity Everyday Thousands of People Are Getting Their Identity Stolen! Learn to Protect Yourself - Right Now - Before It's Too Late! To steal a person's identity, criminals need just one thing to get started. Believe it or Not, it's actually quite easy for them to get it, too...(unless you apply this steps in this book!) Isn't it frightening to think that someone could be out there using your name to commit crime! Anyone can become a victim.
Call Number: 363.25 RAN
Cyber Crime by
Call Number: 364.16 GRA
Publication Date: 2016-01-01
Privacy in the Age of Big Data by Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are ‘watched,’ and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Call Number: 323.448 PAY
Publication Date: 2015
Cyber Self-defence by Are you in danger of being cyberstalked? Have you been cyberbullied? Outwit your cyberattacker with these clever strategies from former cyberstalking victim, Alexis Moore. As the founder of Survivors in Action, Moore explains how to identify potential cyberattackers and how to recover from a cybercrime if you've been attacked. Her indispensable book can help you remain secure and safe in today's dangerous digital world and take back control of your life.
Intellectual property and copyright
Intellectual Property Law by
Call Number: 346.9304 COL
Publication Date: 2014
The LexisNexis Study Guide series is designed to assist students with the foundations for effective, systematic exam preparation and revision.
Intellectual Property and Human Development by This book examines the social impact of intellectual property laws. It addresses issues and trends relating to health, food security, education, new technologies, preservation of bio-cultural heritage and contemporary challenges in promoting the arts. It explores how intellectual property frameworks could be better calibrated to meet socio-economic needs in countries at different stages of development, with local contexts and culture in mind. A resource for policy-makers, stakeholders, non-profits and students, this volume furthermore highlights alternative modes of innovation that are emerging to address such diverse challenges as neglected or resurgent diseases in developing countries and the harnessing of creative possibilities on the Internet. The collected essays emphasize not only fair access by individuals and communities to intellectual property – protected material, whether a cure, a crop variety, clean technology, a textbook or a tune – but also the enhancement of their own capabilities in cultural participation and innovation.
Publication Date: 2010-10-21
Intellectual Property in Australia: 5th ed by Written in clear and engaging terms, this book provides in-depth and topical treatment of each regime and the policy issues they have generated, and draws on leading cases as examples of a particular type of problem or decision.
Call Number: 346.94048 STE
Publication Date: 2014
Cyber law by An essential overview of legal issues related to technology, this resource provides case summaries and proactive strategies on privacy, security, copyright, appropriate online behavior, and more.
Spam Act 2003 The Spam act was passed in 2003 as federal legislation by the Parliament of the Commonwealth of Australia.
Call Number: 343.9409 SPA
Publication Date: 2003