Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • 2005-2009  (3)
  • NetLibrary, Inc  (3)
  • Amsterdam : Elsevier/Academic Press  (1)
  • Amsterdam : Rodopi  (1)
  • Austin : University of Texas Press  (1)
Datasource
Material
Language
Years
Year
Subjects(RVK)
  • 1
    ISBN: 1417552654 , 9781417552658 , 008047876X , 9780080478760
    Language: English
    Edition: Boulder, Colo NetLibrary Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Investigating child exploitation and pornography
    Keywords: Child abuse. ; Children in pornography. ; Child abuse ; Child pornography ; Child pornography ; Child abuse ; Child abuse. ; Children in pornography. ; FAMILY & RELATIONSHIPS ; Abuse ; Child Abuse ; Child abuse ; Child pornography ; SELF-HELP ; Abuse ; Gerichtliche Wissenschaften ; Internet ; Kinderpornographie ; Verbreitung ; USA ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik
    Abstract: Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR
    Description / Table of Contents: CoverCOVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR.
    Note: Title from ebook title screen (viewed Nov. 9, 2004) , Includes bibliographical references and index , Made available through NetLibrary; access may be limited to NetLibrary affiliated libraries , Mode of access: World Wide Web.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 1417591064 , 9781417591060
    Language: English
    Pages: 383 p , 22 cm
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: Costerus new ser. 155
    Series Statement: EBSCOhost eBook Collection
    Series Statement: Costerus
    Parallel Title: Erscheint auch als Hegerfeldt, Anne C Lies that tell the truth
    RVK:
    Keywords: Magic realism (Literature) ; English fiction History and criticism. 20th century ; English fiction History and criticism ; 20th century ; Magic realism (Literature) ; English fiction History and criticism 20th century ; Magic realism (Literature) ; English fiction History and criticism. 20th century ; LITERARY CRITICISM ; European ; English, Irish, Scottish, Welsh ; English fiction ; Magic realism (Literature) ; Criticism, interpretation, etc ; Englisch ; Magischer Realismus ; Rezeption ; Roman ; Electronic books. ; Electronic books. ; Electronic books Criticism, interpretation, etc ; Magischer Realismus ; Rezeption ; Englisch ; Roman ; Geschichte 1969-2000 ; Magischer Realismus ; Rezeption ; Englisch ; Roman ; Geschichte 1969-2000
    Abstract: The critical debate : an overview -- A working definition -- Magic "mongrel" realism : the adaptation of other genres and modes -- Through anOther's eyes : magic realist focalizers -- Mythos meets logos : paradigms of knowledge in magic realist fiction -- Making the real fantastic and the fantastic real : strategies of destabilization -- Making the immaterial matter : techniques of literalization -- Mimicking the mind : magic realism as an inquiry into human thought -- "The only real ism of these back-to-front and jabberwocky days" : mimicking a fantastic reality
    Abstract: Magic realism has long been treated as a phenomenon restricted to postcolonial literature. Drawing on works from Britain, Lies that Tell the Truth compellingly shows how magic realist fiction can be produced also at what is usually considered to be the cultural centre without forfeiting the mode's postcolonial attitude and aims. A close analysis of works by Angela Carter, Salman Rushdie, Jeanette Winterson, Robert Nye and others reveals how the techniques of magic realism generate a complex critique of the West's rational-empirical worldview from within a Western context itself. Understanding magic realism as a fictional analogue of anthropology and sociology, Lies that Tell the Truth reads the mode as a frequently humorous but at the same time critical investigation into people's attempts to make sense of their world. By laying bare the manifold strategies employed to make meaning, magic realist fiction indicates that knowledge and reality cannot be reduced to hard facts, but that people's dreams and fears, ideas, stories and beliefs must equally be taken into account; 1900 - 1999
    Note: Title from ebook title screen (viewed on May 2, 2005) , Includes bibliographical references and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 0292796889 , 9780292796881
    Language: English
    Pages: xix, 306 p , ill , 29 cm
    Edition: 1st ed
    Edition: Boulder, Colo NetLibrary 2005 Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    RVK:
    RVK:
    Keywords: Art, Greek ; Art, Greek Influence. ; Art, Classical ; Art ; Art, Greek Greece ; Athens ; Art, Greek Influence ; Art, Classical Greece ; Athens ; Art, Greek ; Art, Greek Influence. ; Art, Classical ; Art ; Kultur ; Art Greece ; Athen ; Electronic books. ; Electronic books. ; Electronic books ; Bibliografie ; Athen ; Kultur ; Geschichte 500 v. Chr.-450 v. Chr.
    Note: "In honor of J. J. Pollitt." , Includes bibliographical references (p. [277]-295) and index , Electronic reproduction, Boulder, Colo : NetLibrary, 2005
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...