
- Atchison, William F., "Computer Science Preparation for Secondary School Teachers," SIGCSE Bulletin, vol. 5, No. 1, 1973. Google Scholar
Digital Library
- Computer Security Research Group, Computer Security Handbook, Macmillan Information, New York, 1973.Google Scholar
- Cook, Robert N., "An Approach to the Introductory Computer Science Course for Non-Majors," SIGCSE Bulletin, Vol. 9, No. 3, August 1977. Google Scholar
Digital Library
- Gibbs, Norman E., "An Introductory Computer Science Course for All Majors," SIGCSE Bulletin, Vol. 9, No. 3, August 1977. Google Scholar
Digital Library
- Poirot, James L., "A Course Description for Teacher Education in Computer Science," SIGCSE Bulletin, Vol. 8, February 1976. Google Scholar
Digital Library
- Poirot, James L., Data Analysis-Specialized Course for Crime Data Analysts, Criminal Justice Division, Office of the Government, State of Texas, 1976.Google Scholar
- Poirot, James L. and David Groves, Beginning Computer Science, Sterling Swirt Publisher, Manchaca, Texas, 1978.Google Scholar
- Poirot, James L. and David Groves, Computer Science for the Teacher, Sterling Swift Publisher, Manchaca, Texas, 1976.Google Scholar
- Poirot, James L. and G. G. Early, "Teacher Certification-A Computer Science Necessity," Topics in Instructional Computing, ACM, January 1975. Google Scholar
Digital Library
- The Ombudsman Committee on Privacy, ACM, Privacy, Security and the Information Processing Industry, ACM, New York, 1976.Google Scholar
Index Terms
(auto-classified)Computers in law enforcement: a service course
Recommendations
Law Enforcement Agencies' activities in the cloud environment: a European legal perspective
The paper aims at discussing some major issues in relation to the complex and highly debated relationship between Cloud Service Providers ‘CSPs’ and government agency responsible for the enforcement of the laws Law Enforcement Agencies – ‘LEAs’. Our ...
Cryptography, Law Enforcement, and Mobile Communications
In this issue's installment of Crypto Corner, we review the handset-related methods law enforcement agencies can use to gather evidence during criminal investigations. This article's goal is twofold: explain how law enforcement agencies gather handset-...






Comments