| Title | Pages / Words | Save | 
                  
           | Murder Scene | 1 / 167 |  | 
                  
           | Corporal Punishment | 2 / 384 |  | 
                  
           | mafia | 1 / 233 |  | 
                  
           | Bull Gates | 1 / 194 |  | 
                  
           | Crime control | 1 / 286 |  | 
                  
           | Kyle's Paper | 1 / 150 |  | 
                  
           | a dissertation | 2 / 314 |  | 
                  
           | Computer Addiction | 2 / 339 |  | 
                  
           | Computer | 2 / 444 |  | 
                  
           | English | 2 / 358 |  | 
                  
           | if bud abbot was alive today | 3 / 636 |  | 
                  
           | Juvenile Crime | 2 / 336 |  | 
                  
           | UCR & NCVS | 2 / 334 |  | 
                  
           | Computers And How They Influence Our Lives | 2 / 426 |  | 
                  
           | Computers | 2 / 381 |  | 
                  
           | Dell Analysis | 2 / 391 |  | 
                  
           | Econ101 | 2 / 324 |  | 
                  
           | Example of an Executive Summary | 1 / 247 |  | 
                  
           | Building A Computer | 2 / 384 |  | 
                  
           | Clean Slate Program | 2 / 440 |  | 
                  
           | Comparison Essay | 2 / 506 |  | 
                  
           | Computer Crimes | 4 / 1158 |  | 
                  
           | Computer Engineering | 2 / 525 |  | 
                  
           | Computer app | 2 / 373 |  | 
                  
           | computer addiction | 2 / 343 |  | 
                  
           | computer viruses | 1 / 194 |  | 
                  
           | Misconceptions of the Computer Field | 3 / 794 |  | 
                  
           | Role Of Computers In Teaching | 1 / 256 |  | 
                  
           | The One law that I would change(Curfews) | 1 / 272 |  | 
                  
           | Third | 2 / 307 |  | 
                  
           | Youth, Crime, and the Media | 1 / 130 |  | 
                  
           | master skills in computers | 3 / 701 |  | 
                  
           | na | 1 / 269 |  | 
                  
           | black people | 2 / 381 |  | 
                  
           | Causation Of Crime | 2 / 494 |  | 
                  
           | Mastering A Skill | 2 / 373 |  | 
                  
           | Proactive Tactics | 2 / 390 |  | 
                  
           | Adj Presentation | 1 / 217 |  | 
                  
           | Asimov | 3 / 761 |  | 
                  
           | Asimov: Will Computers Control Humans In The Future? | 3 / 761 |  | 
                  
           | Blame | 4 / 916 |  | 
                  
           | Building A Computer | 2 / 384 |  | 
                  
           | Buying A PC | 2 / 324 |  | 
                  
           | Buying A Pc | 2 / 324 |  | 
                  
           | Cell Computer | 2 / 393 |  | 
                  
           | Comparison: Computer to Life | 2 / 472 |  | 
                  
           | Computer Confidentiality | 1 / 217 |  | 
                  
           | Computer Crime 3 | 3 / 880 |  | 
                  
           | Computer Education | 1 / 196 |  | 
                  
           | Computer Forensics Specialist | 1 / 203 |  | 
                  
           | Computer hacking | 3 / 628 |  | 
                  
           | Coolege | 2 / 320 |  | 
                  
           | Coolege | 2 / 320 |  | 
                  
           | career | 3 / 618 |  | 
                  
           | computer engineering | 2 / 568 |  | 
                  
           | computer engineers | 2 / 508 |  | 
                  
           | computer skills | 2 / 401 |  | 
                  
           | criminal justice | 2 / 467 |  | 
                  
           | East Of Eden | 1 / 272 |  | 
                  
           | Ecology of Crime | 2 / 353 |  | 
                  
           | Fields in the Criminal Justice System | 1 / 186 |  | 
                  
           | How Should Guilty People Be Punished? | 2 / 444 |  | 
                  
           | How To Buy A Computer (a How T | 2 / 594 |  | 
                  
           | How have computer changed our live | 2 / 312 |  | 
                  
           | hackers | 2 / 540 |  | 
                  
           | INQUIRE | 2 / 520 |  | 
                  
           | identity theft | 1 / 264 |  | 
                  
           | Looking at Eyewitness TEstimony | 2 / 431 |  | 
                  
           | Macbeth And Lady Macbeth's Guilt | 2 / 418 |  | 
                  
           | Modern Computer | 2 / 390 |  | 
                  
           | misc. | 1 / 258 |  | 
                  
           | No | 2 / 354 |  | 
                  
           | organized crime | 2 / 349 |  | 
                  
           | organized crime | 3 / 733 |  | 
                  
           | Privacy vs. Priacy | 2 / 362 |  | 
                  
           | prevention of violence | 2 / 567 |  | 
                  
           | Review:Measuring and Comparing Crime in and Across Nations | 2 / 476 |  | 
                  
           | The Marriage | 2 / 363 |  | 
                  
           | The Second Amendment | 1 / 55 |  | 
                  
           | The Use Of Pencils As Weapons | 2 / 586 |  | 
                  
           | Trojen in KaZaA | 2 / 307 |  | 
                  
           | UCR vs NCVS | 4 / 983 |  | 
                  
           | Blame | 4 / 916 |  | 
                  
           | Can A Computer Have A Mind | 2 / 480 |  | 
                  
           | Can A Computer Have A Mind | 2 / 546 |  | 
                  
           | Cat and the Hat | 1 / 165 |  | 
                  
           | Philosophy of the Mind | 2 / 368 |  | 
                  
           | crime insanity | 1 / 255 |  | 
                  
           | Computer Science (History) | 2 / 343 |  | 
                  
           | Computer Viruses vs. Biological Viruses | 1 / 290 |  | 
                  
           | Crimonology | 2 / 309 |  | 
                  
           | Forensics | 1 / 203 |  | 
                  
           | Gathering Evidencee | 1 / 258 |  | 
                  
           | most technological advancement | 1 / 265 |  | 
                  
           | Trace Evidence used to solve cases | 1 / 214 |  | 
                  
           | Ucr | 2 / 480 |  | 
                  
           | A General Theory of Crime | 1 / 283 |  | 
                  
           | Crime Control Methods | 2 / 475 |  | 
                  
           | Crime | 2 / 471 |  | 
                  
           | Crimnology | 1 / 219 |  | 
                  
           | crime control and due process | 2 / 366 |  | 
                  
           | crime prevention plan | 1 / 263 |  | 
                  
           | crime | 1 / 167 |  | 
                  
           | Death Penalty is Wrong | 2 / 334 |  | 
                  
           | Juvenile Crime | 2 / 397 |  | 
                  
           | Juvenile Crime: Crime Rates | 2 / 431 |  | 
                  
           | Juvenile Delinquency | 1 / 176 |  | 
                  
           | justice | 1 / 247 |  | 
                  
           | Medical Misdiagnosis | 1 / 269 |  | 
                  
           | Overpopulation in the Prison System | 2 / 318 |  | 
                  
           | situational crime prevention | 3 / 654 |  | 
                  
           | The Death Penalty;Does It Deter Crime | 2 / 391 |  | 
                  
           | The Irrational 18-Year-Old Criminal | 2 / 327 |  | 
                  
           | The Media And The Fear Of Victimization | 2 / 324 |  | 
                  
           | The Media Effect | 2 / 414 |  | 
                  
           | Viedo Games | 2 / 413 |  | 
                  
           | volunteerism | 2 / 316 |  | 
                  
           | White collar and corporate crime | 2 / 544 |  | 
                  
           | Why Might The Figures For Recorded Crime Underestimate The Actual Amount Of Crime That Takes Place? | 4 / 917 |  | 
                  
           | Youth Crime | 1 / 244 |  | 
                  
           | A Hacker | 1 / 261 |  | 
                  
           | Antivirus Programs | 2 / 320 |  | 
                  
           | Artificial Intelligence,Expert System,Robotics,Nlp,Computer Vision | 2 / 367 |  | 
                  
           | Assertive Policing, Plummeting Crime: | 2 / 477 |  | 
                  
           | asdf | 1 / 264 |  | 
                  
           | Best Job Offered To Hrm | 1 / 241 |  | 
                  
           | Computer Abuse | 4 / 1102 |  | 
                  
           | Computer Addiction | 2 / 415 |  | 
                  
           | Computer Components | 1 / 268 |  | 
                  
           | Computer Crime Is Increasing | 5 / 1425 |  | 
                  
           | Computer Crime Is Increasing | 5 / 1425 |  | 
                  
           | Computer Crime | 4 / 1072 |  | 
                  
           | Computer Crime | 5 / 1342 |  | 
                  
           | Computer Crime | 2 / 465 |  | 
                  
           | Computer Crime | 5 / 1353 |  | 
                  
           | Computer Crime | 2 / 482 |  | 
                  
           | Computer Crimes | 3 / 663 |  | 
                  
           | Computer Crimes | 3 / 776 |  | 
                  
           | Computer Crimes | 3 / 864 |  | 
                  
           | Computer Engineering Degree | 2 / 316 |  | 
                  
           | Computer Engineering | 2 / 523 |  | 
                  
           | Computer Fraud And Crimes | 4 / 1005 |  | 
                  
           | Computer Hardware | 1 / 292 |  | 
                  
           | Computer Nerds: Wozniak, Jobs, Gates, And Allen | 1 / 261 |  | 
                  
           | Computer Technician | 2 / 414 |  | 
                  
           | Computer Technology | 2 / 311 |  | 
                  
           | Computer Virus | 2 / 493 |  | 
                  
           | Computer Viruses | 3 / 714 |  | 
                  
           | Computer Viruses | 2 / 509 |  | 
                  
           | Computer crime | 1 / 107 |  | 
                  
           | Computer crimes | 4 / 1131 |  | 
                  
           | Computer | 1 / 245 |  | 
                  
           | Computerized World | 2 / 326 |  | 
                  
           | Computers In Education | 2 / 477 |  | 
                  
           | Computers | 1 / 239 |  | 
                  
           | Computers | 2 / 420 |  | 
                  
           | Copyright And Privacy With Computer Ethic | 2 / 315 |  | 
                  
           | Creative Writing: Hackers Manifesto | 2 / 534 |  | 
                  
           | Crime and Forensics ? Short-Answer Questions | 3 / 776 |  | 
                  
           | Cyber Security | 3 / 611 |  | 
                  
           | Cybercrime in india | 2 / 386 |  | 
                  
           | comp | 1 / 130 |  | 
                  
           | computer Security By Time Life Books | 2 / 526 |  | 
                  
           | computer ethics | 1 / 267 |  | 
                  
           | computer forensics | 1 / 297 |  | 
                  
           | computer virus | 1 / 267 |  | 
                  
           | cyber crime | 1 / 222 |  | 
                  
           | Definition essay on computer | 1 / 277 |  | 
                  
           | Gen105 Essay | 2 / 371 |  | 
                  
           | Hackers | 1 / 61 |  | 
                  
           | Information About Viruses | 2 / 321 |  | 
                  
           | Information Technology and the Other Degree Programs | 2 / 530 |  | 
                  
           | Internet Hackers | 3 / 819 |  | 
                  
           | Juvenile CRIME | 1 / 248 |  | 
                  
           | life without computers | 2 / 375 |  | 
                  
           | Mac's Vs. PC's | 2 / 315 |  | 
                  
           | None Yet | 2 / 332 |  | 
                  
           | PC vs MAC | 2 / 401 |  | 
                  
           | Parts of Computer | 2 / 557 |  | 
                  
           | Personal Computer Games | 2 / 326 |  | 
                  
           | Process Analysis | 2 / 406 |  | 
                  
           | Programmer | 2 / 364 |  | 
                  
           | Pursuit Of A Dream | 1 / 298 |  | 
                  
           | pwd | 2 / 344 |  | 
                  
           | Steve Jobs | 2 / 396 |  | 
                  
           | Symantec Vulnerability | 2 / 301 |  | 
                  
           | sdd | 1 / 63 |  | 
                  
           | security | 3 / 735 |  | 
                  
           | Technological Progress In Computer Industry | 2 / 473 |  | 
                  
           | Terrorism | 1 / 203 |  | 
                  
           | The Basics Of A Hard Drive | 2 / 571 |  | 
                  
           | The Computer Mouse | 1 / 163 |  | 
                  
           | The Computer War | 1 / 153 |  | 
                  
           | USING COMPUTERS | 1 / 299 |  | 
                  
           | Uk Supermarket Retail Industry | 1 / 192 |  | 
                  
           | Virus Essay | 2 / 426 |  | 
                  
           | What Should And Shouldn't Computer Be Allowed To Run | 2 / 516 |  | 
                  
           | Will Computers Control Humans In The Future? | 3 / 867 |  | 
                  
           | Windows 3.0 | 1 / 146 |  | 
                  
           | Yeah | 1 / 240 |  |