Jeffrey A. Lee
Online Predators, An Internet Insurgency
A Field Manual for Teaching and Parenting in the Digital Arena
Jeffrey A. Lee
Online Predators, An Internet Insurgency
A Field Manual for Teaching and Parenting in the Digital Arena
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Jeffrey Lee teaches parents and stakeholders to use the tech against itself to protect children.
Andere Kunden interessierten sich auch für
- Dana L. C. MillerParent Handbook for Online Safety12,99 €
- Philippa MawkingOnline Traffic & Advertisements11,99 €
- Security Solutions for Hyperconnectivity and the Internet of Things223,99 €
- LeonardoEmpowered Learners25,99 €
- Kids Against TraffickingKAT - A Kid's Guide to Staying Safe Online37,99 €
- Privacy and Safety in Online Learning23,99 €
- Theodore ShraderJava and Internet Security19,99 €
-
-
-
Jeffrey Lee teaches parents and stakeholders to use the tech against itself to protect children.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Globe Pequot Publishing Group Inc/Bloomsbury
- 2nd Edition
- Seitenzahl: 156
- Erscheinungstermin: 10. Oktober 2023
- Englisch
- Abmessung: 235mm x 157mm x 13mm
- Gewicht: 387g
- ISBN-13: 9781475870220
- ISBN-10: 1475870221
- Artikelnr.: 67741282
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Globe Pequot Publishing Group Inc/Bloomsbury
- 2nd Edition
- Seitenzahl: 156
- Erscheinungstermin: 10. Oktober 2023
- Englisch
- Abmessung: 235mm x 157mm x 13mm
- Gewicht: 387g
- ISBN-13: 9781475870220
- ISBN-10: 1475870221
- Artikelnr.: 67741282
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Jeffrey A. Lee is a career law enforcement professional with over twenty years of experience. He's a Master Texas Peace Officer with a certification in Cybercrime Investigations. With a wide background in digital forensics and the conduct of criminal investigations, he also possesses a Bachelor's Degree in Law Enforcement and Police Sciences from Sam Houston State University. Jeff currently supervises a criminal investigations unit in Houston, Texas.
Dedication
Foreword by Eric Devlin, expert in digital forensics and child exploitation
Preface
Introduction: Technology and the Role of the Stakeholder In a Child's Life,
To Share or Not to Share Isn't the Question
Chapter 1: Information as a Weaponized Commodity
Chapter 2: Freedoms of the Internet
Chapter 3: The Home is Not a Democracy, and School Safety Searches
Chapter 4: Truth and Efficiency on the Internet
Chapter 5: Nothing is Better Than the Truth
Chapter 6: Hamsters are Rats, and Devices Are Hamsters But Still Rats
Chapter 7: Pickup that Device
Chapter 8: Methodology of the Child Predator
Chapter 9: Gifts as a Means to an End
Chapter 10: Pictures are Priceless
Chapter 11: Basic Types of Child Abuse Images and Other Usages of Sexual
Images
Chapter 12: Romance and Hookup Scams
Chapter 13: Instant Photography
Chapter 14: Is There a Plan?
Chapter 15: Which Device Should I Buy?
Chapter 16: What to Expect From Law Enforcement
Chapter 17: Post Victimization Recovery
Chapter 18: The Backspace/Delete Key and Self Editing
Chapter 19: Educate the Child
Chapter 20: Human Trafficking and Social Media: A Case Study
Chapter 21: A Month in the Life of a Child Exploitation Investigator
Chapter 22: Do Not Suffer Alone
Chapter 23: It's Not All Bad
About the Author
Foreword by Eric Devlin, expert in digital forensics and child exploitation
Preface
Introduction: Technology and the Role of the Stakeholder In a Child's Life,
To Share or Not to Share Isn't the Question
Chapter 1: Information as a Weaponized Commodity
Chapter 2: Freedoms of the Internet
Chapter 3: The Home is Not a Democracy, and School Safety Searches
Chapter 4: Truth and Efficiency on the Internet
Chapter 5: Nothing is Better Than the Truth
Chapter 6: Hamsters are Rats, and Devices Are Hamsters But Still Rats
Chapter 7: Pickup that Device
Chapter 8: Methodology of the Child Predator
Chapter 9: Gifts as a Means to an End
Chapter 10: Pictures are Priceless
Chapter 11: Basic Types of Child Abuse Images and Other Usages of Sexual
Images
Chapter 12: Romance and Hookup Scams
Chapter 13: Instant Photography
Chapter 14: Is There a Plan?
Chapter 15: Which Device Should I Buy?
Chapter 16: What to Expect From Law Enforcement
Chapter 17: Post Victimization Recovery
Chapter 18: The Backspace/Delete Key and Self Editing
Chapter 19: Educate the Child
Chapter 20: Human Trafficking and Social Media: A Case Study
Chapter 21: A Month in the Life of a Child Exploitation Investigator
Chapter 22: Do Not Suffer Alone
Chapter 23: It's Not All Bad
About the Author
Dedication
Foreword by Eric Devlin, expert in digital forensics and child exploitation
Preface
Introduction: Technology and the Role of the Stakeholder In a Child's Life,
To Share or Not to Share Isn't the Question
Chapter 1: Information as a Weaponized Commodity
Chapter 2: Freedoms of the Internet
Chapter 3: The Home is Not a Democracy, and School Safety Searches
Chapter 4: Truth and Efficiency on the Internet
Chapter 5: Nothing is Better Than the Truth
Chapter 6: Hamsters are Rats, and Devices Are Hamsters But Still Rats
Chapter 7: Pickup that Device
Chapter 8: Methodology of the Child Predator
Chapter 9: Gifts as a Means to an End
Chapter 10: Pictures are Priceless
Chapter 11: Basic Types of Child Abuse Images and Other Usages of Sexual
Images
Chapter 12: Romance and Hookup Scams
Chapter 13: Instant Photography
Chapter 14: Is There a Plan?
Chapter 15: Which Device Should I Buy?
Chapter 16: What to Expect From Law Enforcement
Chapter 17: Post Victimization Recovery
Chapter 18: The Backspace/Delete Key and Self Editing
Chapter 19: Educate the Child
Chapter 20: Human Trafficking and Social Media: A Case Study
Chapter 21: A Month in the Life of a Child Exploitation Investigator
Chapter 22: Do Not Suffer Alone
Chapter 23: It's Not All Bad
About the Author
Foreword by Eric Devlin, expert in digital forensics and child exploitation
Preface
Introduction: Technology and the Role of the Stakeholder In a Child's Life,
To Share or Not to Share Isn't the Question
Chapter 1: Information as a Weaponized Commodity
Chapter 2: Freedoms of the Internet
Chapter 3: The Home is Not a Democracy, and School Safety Searches
Chapter 4: Truth and Efficiency on the Internet
Chapter 5: Nothing is Better Than the Truth
Chapter 6: Hamsters are Rats, and Devices Are Hamsters But Still Rats
Chapter 7: Pickup that Device
Chapter 8: Methodology of the Child Predator
Chapter 9: Gifts as a Means to an End
Chapter 10: Pictures are Priceless
Chapter 11: Basic Types of Child Abuse Images and Other Usages of Sexual
Images
Chapter 12: Romance and Hookup Scams
Chapter 13: Instant Photography
Chapter 14: Is There a Plan?
Chapter 15: Which Device Should I Buy?
Chapter 16: What to Expect From Law Enforcement
Chapter 17: Post Victimization Recovery
Chapter 18: The Backspace/Delete Key and Self Editing
Chapter 19: Educate the Child
Chapter 20: Human Trafficking and Social Media: A Case Study
Chapter 21: A Month in the Life of a Child Exploitation Investigator
Chapter 22: Do Not Suffer Alone
Chapter 23: It's Not All Bad
About the Author