Welcome to STUDYtactics.com    
  BOOKS eCONTENT SPECIALTY STORES MY STUDYaides MY ACCOUNT  
New & Used Books
 
Product Detail
Product Information   |  Other Product Information

Product Information
Cyber Crime Fighters: Tales from the Trenches
Cyber Crime Fighters: Tales from the Trenches
Author: Donovan, Felicia
Edition/Copyright: 2009
ISBN: 0-7897-3922-4
Publisher: Que
Type: Paperback
Used Print:  $16.50
Other Product Information
Summary
Table of Contents
 
  Summary

�Cyber Crime Fighters: Tales from the Trenches offers one of the most insightful views of the latest criminal threats to the public: cyber crime. This book provides a good primer on how your personal information can be easily obtained by some of the folks you least want to have it.�

�Maureen Boyle, crime reporter,

The Enterprise of Brockton, MA

�Experts Felicia Donovan and Kristyn Bernier pull no punches in explaining the dangers lurking on the Web, from identity appropriation and theft to using new technology and the Internet to facilitate real-life stalking. Parents especially will be shocked at how easy it is for predators to target and solicit children online.

�By clearly explaining the dangers that lurk online and highlighting practical tips to minimize your risk, the authors have created a book that not only educates but empowers readers to protect themselves.�

�Jennifer Hemmingsen, columnist and former public safety reporter,

The (Cedar Rapids, Iowa) Gazette

Written by leading cyber crime investigators, Cyber Crime Fighters: Tales from the Trenches takes you behind the scenes to reveal the truth behind Internet crime, telling shocking stories that aren�t covered by the media, and showing you exactly how to protect yourself and your children. This is the Internet crime wave as it really looks to law enforcement insiders: the truth about crime on social networks and YouTube, cyber stalking and criminal cyber bullying, online child predators, identity theft, even the latest cell phone crimes. Here are actual cases andactual criminals, presented by investigators who have been recognized by the FBI and the N.H. Department of Justice. These stories are true�and if you want to stay safe, you need to know about them.

� Learn how today�s criminals can track your whereabouts, read your emails, and steal your identity

� Find out how much of your personal information is already online�and how to keep the rest private

� Learn how cyber stalkers really think�and how to protect yourself from them

� Protect your laptop, your iPod, and your precious data from getting stolen

� Encounter the �dark side� of Internet dating

� Discover the hidden crime wave on today�s specialized social networks

� Uncover the cell phone �upskirters� and �downblousers� �and the technicalities that keep them out of jail

� Follow cyber crime specialists as they investigate and catch online sexual predators

� Get the real truth about phishing, pharming, criminal spam, and online scams

� See how investigations really work�and why TV crime shows often get it wrong!

� Walk through your own personal, step-by-step, online safety checkup

 
  Table of Contents
Chapter 1 Cyber Stalking 1 High-Tech Stalkers2 "How I Stalked My Girlfriend"4 The Victim's Side8 Identity Assumption9 The Wild, Wild Web10 Sticks and Stones13 The "Stalker" E-Card14 Cyber Stalking and the Law16 Cyber Stalking Facts17 Lethality Assessment Tools18 If You Think You Are Being Cyber Stalked19 Teen/Tech Stalking21 Teen Study21 Online Gamesndash;The New Stalker's Ground22 Online Gaming and Malware23 Would You Say It to My Face?23 National School Board Survey23 Women as Perpetrators26 Cyber Stalking Prevention Resources26 Chapter 2 Two Bedrooms Up, One Bedroom Downndash;What Someone Can Find Out About You on the Internet27 Your Digital Footprint28 The Best Sources to Find Out About People28 "Tracking Teresa"29 Town and City Websites29 Zillowndash;We Know Your Neighborhood31 We Know Your Dog's Name31 Online Memorials32 nb
 

New & Used Books -  eContent -  Specialty Stores -  My STUDYaides -  My Account

Terms of Service & Privacy PolicyContact UsHelp © 1995-2024 STUDYtactics, All Rights Reserved