Computer crimesSee also what's at Wikipedia, your library, or elsewhere.
Broader term:Related term:Narrower terms:Used for:- Computers and crime
- Cyber crimes
- Cybercrimes
- Electronic crimes (Computer crimes)
- Internet crimes
- Cybercrime
|
Filed under: Computer crimes- Rights and Responsibilities of Participants in Networked Communities (1994), ed. by Dorothy Elizabeth Robling Denning and Herbert Lin (HTML with commentary at NAP)
- The cost of crimes against business. ([Washington, D.C.] : U.S. Department of Commerce, Domestic and International Business Administration, Bureau of Domestic Commerce, 1974., 1974), by United States. Bureau of Domestic Commerce (page images at HathiTrust)
- Council of Europe Convention on Cybercrime (Treaty Doc. 108-11) : report (to accompany Treaty Doc. 108-11). (U.S. G.P.O., 2005), by United States Senate Committee on Foreign Relations (page images at HathiTrust)
- An analysis of computer security safeguards for detecting and preventing intentional computer misuse (U.S. Dept. of Commerce, National Bureau of Standards :, 1978), by Brian Ruder, Robert P. Blanc, J. D. Madden, United States. National Bureau of Standards, Institute for Computer Sciences and Technology, and Stanford Research Institute (page images at HathiTrust)
- Convention on Cybercrime : message from the President of the United States transmitting Council of Europe Convention on Cybercrime (the "Cybercrime Convention" or the "Convention"), which was signed by the United States on November 23, 2001. (U.S. G.P.O., 2003), by United States. (2001), United States Senate Committee on Foreign Relations, and United States. President (2001-2009 : Bush) (page images at HathiTrust)
- Online pornography : closing the door on pervasive smut : hearing before the Subcommittee on Commerce, Trade, and Consumer Protection of the Committee on Energy and Commerce, House of Representatives, One Hundred Eighth Congress, second session, May 6, 2004. (U.S. G.P.O. :, 2004), by Trade United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Commerce (page images at HathiTrust)
- The encryption debate : criminals, terrorists, and the security needs of business and industry : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session ... September 3, 1997. (U.S. G.P.O. :, 1998), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Computer Resource Management Technology Program (PE 6474OF). Task #9, Advanced user authentication. (U.S. Department of Transportation, Research and Special Programs Administration, Transportation Systems Center ;, 1988), by W. Barron, L. Watson, United States. Air Force. Systems Command. Electronic Systems Division, and Transportation Systems Center (page images at HathiTrust)
- Are we prepared for cyberwar? (U.S. G.P.O., 2000), by Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Computer security : cyber attacks - war without borders : hearing before the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, 106th Congress, 2nd session, July 26, 2000. (U.S. G.P.O., 2001), by Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Cyberterrorism and computer crimes : issues surrounding the establishment of an international regime (USAF Institute for National Security Studies, 2000), by Richard W. Aldrich and USAF Institute for National Security Studies (page images at HathiTrust)
- Computer crime : its setting and the need for deterrent legislation (Data Information Systems Commission, Illinois General Assembly, 1979), by Stanley L. Sokolik and Illinois. Data Information Systems Commission (page images at HathiTrust)
- ICANN generic top-level domains (gTLD) : hearing before the Subcommittee on Intellectual Property, Competition, and the Internet of the Committee on the Judiciary, House of Representatives, One Hundred Twelfth Congress, first session, May 4, 2011 (U.S. G.P.O. :, 2011), by Competition United States. Congress. House. Committee on the Judiciary. Subcommittee on Intellectual Property (page images at HathiTrust)
- Computer crime and security ([Washington, D.C.] : The Library of Congress, Congressional Research Service, Major Issues System, [1980], 1980), by Louise Giovane Becker and Library of Congress. Congressional Research Service (page images at HathiTrust)
- The insider threat to secure facilities : data analysis (Washington, D.C. : U.S. Nuclear Regulatory Commission, 1980., 1980), by J.M. Heineke and Associates, United States Government Printing Office, United States. National Technical Information Service, and Fuel Cycle U.S. Nuclear Regulatory Commission. Division of Safeguards (page images at HathiTrust)
- Audit and evaluation of computer security : proceedings of the NBS invitational workshop held at Miami Beach, Florida, March 22-24, 1977 (Dept. of Commerce, National Bureau of Standards, Institute for Computer Sciences and Technology : for sale by the Supt. of Docs.,U.S. Govt. Print. Off., 1977), by Fla.) NBS Invitational Workshop on Audit and Evaluation of Computer Security (1977 : Miami Beach, Robert G. McKenzie, Zella G. Ruthberg, United States. National Bureau of Standards, United States General Accounting Office, and Institute for Computer Sciences and Technology (page images at HathiTrust)
- Computers, crimes, clues and controls (The Council?, 1986), by President's Council on Integrity and Efficiency (U.S.). Prevention Committee (page images at HathiTrust)
Filed under: Computer crimes -- Australia
Filed under: Computer crimes -- Congresses
Filed under: Computer crimes -- Costs
Filed under: Computer crimes -- Government policy
Filed under: Computer crimes -- Handbooks, manuals, etc.- Computer crime : criminal justice resource manual. (National Criminal Justice Information and Statistics Service, Law Enforcement Assistance Administration, U.S. Dept. of Justice :, 1979), by SRI International and United States. National Criminal Justice Information and Statistics Service (page images at HathiTrust)
- Computer crime : criminal justice resource manual (U.S. Dept. of Justice, National Institute of Justice, Office of Justice Programs, 1989), by Donn B. Parker, SRI International, Abt Associates, and National Institute of Justice (U.S.). Office of Justice Programs (page images at HathiTrust)
Filed under: Computer crimes -- Investigation- Organizing for computer crime investigation and prosecution (U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1989), by Catherine H. Conly, Abt Associates, and National Institute of Justice (U.S.) (page images at HathiTrust)
- Investigative uses of technology : devices, tools, and techniques (U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2007), by National Institute of Standards and Technology (U.S.). Office of Law Enforcement Standards, National Institute of Justice (U.S.), and Technology Working Group for Investigative Uses of High Technology (page images at HathiTrust)
Filed under: Computer crimes -- Law and legislation
Filed under: Computer crimes -- Periodicals- Journal of Online Trust and Safety (2021-)
Filed under: Computer crimes -- Prevention- Computers : crimes, clues and controls ; a management guide (The Committee :, 1986), by President's Council on Integrity and Efficiency (U.S.). Prevention Committee (page images at HathiTrust)
- Who might be lurking at your cyber front door? Is your system really secure? : strategies and technologies to prevent, detect, and respond to the growing threat of network vulnerabilities : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, June 2, 2004. (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- The state of online consumer privacy : hearing before the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Twelfth Congress, first session, March 16, 2011. (U.S. G.P.O. :, 2012), by United States Senate Committee on Commerce, Science, and Transportation (page images at HathiTrust)
- Computers, crimes, clues and controls (The Council?, 1986), by President's Council on Integrity and Efficiency (U.S.). Prevention Committee (page images at HathiTrust)
Filed under: Computer crimes -- Prevention measures
Filed under: Computer crimes -- South AfricaFiled under: Computer crimes -- United States- The Use of Computers to Transmit Material Inciting Crime: Hearing Before the Subcommittee on Security and Terrorism of the Committee on the Judiciary, United States Senate, Ninety-Ninth Congress, First Session, on the Use of Computers to Transmit Material That Incites Crime and Constitutes Interstate Transmission of Implicit Obscene Matter, June 11, 1985 (Washington: GPO, 1985), by United States Senate Committee on the Judiciary (page images at HathiTrust)
- My Tiny Life: Crime and Passion in a Virtual World (c1998), by Julian Dibbell (PDF with commentary at lulu.com)
- The Hacker Crackdown: Law and Disorder on the Electronic Frontier, by Bruce Sterling (Gutenberg text)
- The cost of crimes against business. ([Washington, D.C.] : U.S. Department of Commerce, Domestic and International Business Administration, Bureau of Domestic Commerce, 1974., 1974), by United States. Bureau of Domestic Commerce (page images at HathiTrust)
- Computer crime : electronic fund transfer systems and crime (U.S. Dept. of Justice, Bureau of Justice Statistics :, 1982), by Kent W. Colton, Inc Public Systems Evaluation, and United States Bureau of Justice Statistics (page images at HathiTrust)
- Computer Systems Protection act of 1979, S. 240 hearing before the Subcommittee on Criminal Justice of the Committee on the Judiciary, United States Senate, Ninety-sixth Congress, second session, on S. 240, February 28, 1980. (U.S. G.P.O., 1981), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Justice (page images at HathiTrust)
- Federal Computer Systems Protection Act hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-seventh Congress, second session, on H.R. 3970 ... September 23, 1982. (U.S. G.P.O., 1984), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights (page images at HathiTrust)
- Computer crime and computer security hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. (U.S. G.P.O., 1986), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
- Staff study of computer security in Federal programs (U.S. Govt. Print. Off., 1977), by United States Senate Committee on Government Operations (page images at HathiTrust)
- Federal computer systems protection act : hearings before the Subcommittee on Criminal Laws and Procedures of the Committee on the Judiciary, United States Senate, Ninety-fifth Congress, second session, on S. 1766, June 21 and 22, 1978. (U.S. Govt. Print. Off. :, 1979), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Laws and Procedures (page images at HathiTrust)
- Computer crime : criminal justice. (Dept. of Justice, Law Enforcement Assistance Administration, National Criminal Justice Information and Statistics Service, 1979), by United States. National Criminal Justice Information and Statistics Service and SRI International (page images at HathiTrust)
- The Distribution of illegal incident characteristics : cases of bank fraud and embezzlement, computer-related crime, and insider theft from drug manufacturers and distributors (The Commission :, 1980), by Lawrence Livermore Laboratory, Fuel Cycle U.S. Nuclear Regulatory Commission. Division of Safeguards, and J.M. Heineke and Associates (page images at HathiTrust)
- Problems associated with computer technology in Federal programs and private industry computer abuses (U.S. Govt. Print. Off., 1976), by United States Senate Committee on Government Operations (page images at HathiTrust)
- Electronic crime needs assessment for state and local law enforcement (U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2001), by Hollis Stambaugh and National Institute of Justice (U.S.) (page images at HathiTrust)
- Status of information security and the effects of the Federal Information Security Management Act (FISMA) at federal agencies (U.S. G.P.O. :, 2004), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Identity theft : the causes, costs, consequences, and potential solutions : hearing before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census of the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, second session, September 22, 2004. (U.S. G.P.O. :, 2005), by Information Policy United States. Congress. House. Committee on Government Reform. Subcommittee on Technology (page images at HathiTrust)
- Cyberterrorism : how real is the threat? (United States Institute of Peace, 2004), by Gabriel Weimann and United States Institute of Peace (page images at HathiTrust)
- Regarding spyware : hearing before the Subcommittee on Trade, Tourism, and Economic Development of the Committee on Commerce, Science, and Transportation, United States Senate, One Hundred Ninth Congress, first session, October 5, 2005. (U.S. G.P.O. :, 2006), by Science United States. Congress. Senate. Committee on Commerce (page images at HathiTrust)
- Crime in service industries (The Administration, 1977), by United States. Domestic and International Business Administration (page images at HathiTrust)
- Cybercrime, transnational crime, and intellectual property theft : hearing before the Joint Economic Committee, Congress of the United States, One Hundred Fifth Congress, second session, March 24, 1998. (U.S. G.P.O. :, 1998), by United States. Congress. Joint Economic Committee (page images at HathiTrust)
- Computer generated check fraud : hearing before the Subcommittee on Domestic and International Monetary Policy of the Committee on Banking and Financial Services, House of Representatives, One Hundred Fifth Congress, first session, May 1, 1997. (U.S. G.P.O. :, 1997), by United States. Congress. House. Committee on Banking and Financial Services. Subcommittee on Domestic and International Monetary Policy (page images at HathiTrust)
- Telecommunications network security : hearings before the Subcommittee on Telecommunications and Finance of the Committee on Energy and Commerce, House of Representatives, One Hundred Third Congress, first session, April 29 and June 9, 1993. (U.S. G.P.O. :, 1994), by United States. Congress. House. Committee on Energy and Commerce. Subcommittee on Telecommunications and Finance (page images at HathiTrust)
- Computer fraud legislation : hearing before the Subcommittee on Criminal Law of the Committee on the Judiciary, United States Senate, Ninety-ninth Congress, first session, on S. 440 ... and S. 1678 ... October 30, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Criminal Law (page images at HathiTrust)
- Computer crime and computer security : hearing before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-ninth Congress, first session, on H.R. 1001 and H.R. 930 ... May 23, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
- Computer virus legislation : hearing before the Subcommittee on Criminal Justice of the Committee on the Judiciary, House of Representatives, One Hundred First Congress, first session, on H.R. 55 and H.R. 287 ... November 8, 1989. (U.S. G.P.O. :, 1990), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Criminal Justice (page images at HathiTrust)
- Computer Pornograph [i.e. Pornography] and Child Exploitation Prevention Act : hearing before the subcommittee on Juvenile Justice of the Committee on the Judiciary, United States Senate, Ninety-ninth Congress, first session, on S. 1305, a bill to amend Title 18, United States Code ... October 1, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Juvenile Justice (page images at HathiTrust)
- Implementation of the Computer Security Act (Public Law 100-235) : hearing before the Subcommittee on Transportation, Aviation, and Materials of the Committee on Science, Space, and Technology, U.S. House of Representatives, One Hundred First Congress, second session, July 10, 1990. (U.S. G.P.O. :, 1990), by Space United States. Congress. House. Committee on Science (page images at HathiTrust)
- The Computer Abuse Amendments Act of 1990 : hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, second session, on S. 2476 ... July 31, 1990. (U.S. G.P.O. :, 1991), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law (page images at HathiTrust)
- Internet crimes affecting consumers : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session, on S. 474, a bill to amend sections 1081 and 1084 of Title 18, United States Code, March 19, 1997. (U.S. G.P.O. :, 1997), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- The Internet Gambling Act of 1997 : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session, on S. 474, a bill to amend sections 1081 and 1084 of Title 18, United States Code, July 28, 1997. (U.S. G.P.O. :, 1997), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- The encryption debate : criminals, terrorists, and the security needs of business and industry : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fifth Congress, first session ... September 3, 1997. (U.S. G.P.O. :, 1998), by Terrorism United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology (page images at HathiTrust)
- Computer security impact of Y2K : expanded risks or fraud? : joint hearing before the Subcommittee on Technology of the Committee on Science and the Subcommittee on Government Management, Information, and Technology of the Committee on Government Reform, House of Representatives, One Hundred Sixth Congress, first session, August 4, 1999. (U.S. G.P.O. :, 2000), by United States House Subcommittee on Technology and Information United States. Congress. House. Committee on Government Reform. Subcommittee on Government Management (page images at HathiTrust)
- Securities fraud on the internet : hearings before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Sixth Congress, first session, March 22 and 23, 1999. (U.S. G.P.O. :, 1999), by United States. Congress. Senate. Committee on Governmental Affairs. Permanent Subcommittee on Investigations (page images at HathiTrust)
- Fraud on the Internet : scams affecting consumers : hearing before the Permanent Subcommittee on Investigations of the Committee on Governmental Affairs, United States Senate, One Hundred Fifth Congress, second session, February 10, 1998. (U.S. G.P.O. :, 1998), by United States. Congress. Senate. Committee on Governmental Operations. Permanent Subcommittee on Investigations (page images at HathiTrust)
- Computer-related crimes in Federal programs : report to the Congress (U.S. General Accounting Office, 1976), by United States General Accounting Office (page images at HathiTrust)
- Computer crime : computer security techniques. (U.S. Dept. of Justice, Bureau of Justice Statistics :, 1982), by SRI International and United States Bureau of Justice Statistics (page images at HathiTrust)
- Computer crime : legislative resource manual. (U.S. Dept. of Justice, Bureau of Justice Statistics, 1981), by Koba Associates and United States Bureau of Justice Statistics (page images at HathiTrust)
- Computer crime : expert witness manual. (U.S. Dept. of Justice, Bureau of Justice Statistics, 1981), by Koba Associates and United States Bureau of Justice Statistics (page images at HathiTrust)
- Electronic Communications Privacy Act of 2000 : report (to accompany H.R. 5018) (including cost estimate of the Congressional Budget Office). (U.S. G.P.O., 2000), by United States House Committee on the Judiciary (page images at HathiTrust)
- Supporting Internet safety awareness : report (to accompany H. Res. 575). (U.S. G.P.O., 2000), by United States. Congress. House. Committee on Commerce (page images at HathiTrust)
- Computer Security Research and Training Act of 1985 : hearing before a subcommittee of the Committee on Government Operations, House of Representatives, Ninety-ninth Congress, first session, on H.R. 2889 ... September 18, 1985. (U.S. G.P.O. :, 1986), by United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee (page images at HathiTrust)
- Digital Privacy Act of 2000 (U.S. G.P.O. :, 2000), by United States. Congress. House. Committee on the Judiciary. Subcommittee on the Constitution (page images at HathiTrust)
- Federal Computer Systems Protection Act : hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-seventh Congress, second session, on H.R. 3970 ... September 23, 1982. (U.S. G.P.O. :, 1984), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights (page images at HathiTrust)
- Unauthorized access to individual medical records : hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, second session, on H.R. 5831 ... August 9, 1984. (U.S. G.P.O. :, 1986), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights (page images at HathiTrust)
- Counterfeit Access Device and Computer Fraud and Abuse Act : hearings before the Subcommittee on Crime of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, first and second session, on H.R. 3181, H.R. 3570, and H.R. 5112 ... September 29; November 10, 1983; and March 28, 1984. (U.S. G.P.O. :, 1985), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Crime (page images at HathiTrust)
- Computer crime : hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, first session ... November 18, 1983. (U.S. G.P.O. :, 1984), by United States. Congress. House. Committee on the Judiciary. Subcommittee on Civil and Constitutional Rights (page images at HathiTrust)
- S. 1920, Small Business Computer Crime Prevention Act : hearing before the Committee on Small Business, United States Senate, Ninety-eighth Congress, second session, on S. 1920, Small Business Computer Crime Prevention Act, March 7, 1984. (U.S. G.P.O., 1984), by United States. Congress. Senate. Committee on Small Business (page images at HathiTrust)
- Small Business Computer Crime Prevention Act, H.R. 3075 : hearing before the Subcommittee on Antitrust and Restraint of Trade Activities Affecting Small Business of the Committee on Small Business, House of Representatives, Ninety-eighth Congress, first session, Washington, D.C., July 14, 1983. (U.S. G.P.O. :, 1983), by United States. Congress. House. Committee on Small Business. Subcommittee on Antitrust and Restraint of Trade Activities Affecting Small Business (page images at HathiTrust)
- Computer crime : Electronic fund transfer systems fraud (U.S. Dept. of Justice, Bureau of Justice Statistics :, 1986), by James M. Tien, Cahn Michael F., Thomas F. Rich, United States Bureau of Justice Statistics, and Inc Public Systems Evaluation (page images at HathiTrust)
- Computer crime : criminal justice resource manual (Bureau of Justice Statistics, U.S. Dept. of Justice, 1980), by SRI International, United States. National Criminal Justice Information and Statistics Service, and United States Bureau of Justice Statistics (page images at HathiTrust)
- Cyber security : responding to the threat of cyber crime and terrorism : hearing before the Subcommittee on Crime and Terrorism of the Committee on the Judiciary, United States Senate, One Hundred Twelfth Congress, first session, April 12, 2011 (U.S. G.P.O. :, 2011), by United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Crime and Terrorism (page images at HathiTrust)
- Computer crime and security ([Washington, D.C.] : The Library of Congress, Congressional Research Service, Major Issues System, [1980], 1980), by Louise Giovane Becker and Library of Congress. Congressional Research Service (page images at HathiTrust)
- Chinese hacking : impact on human rights and commercial rule of law : hearing before the Congressional-Executive Commission on China, One Hundred Thirteenth Congress, first session, June 25, 2013. (Washington : U.S. Government Printing Office, 2013., 2013), by United States Congressional-Executive Commission on China (page images at HathiTrust)
- Expert witness manual. (U.S. Dept. of Justice, Bureau of Justice Statistics :, 1980), by Koba Associates and United States Bureau of Justice Statistics (page images at HathiTrust)
- Computer crime : legislative resource manual. (U.S. Dept. of Justice, Bureau of Justice Statistics :, 1981), by Koba Associates and United States Bureau of Justice Statistics (page images at HathiTrust)
More items available under narrower terms. |