Computer crime, investigation, and the law
Na minha lista:
Autor principal: | Easttom, William C. |
---|---|
Autor Corporativo: | ebrary, Inc |
Outros Autores: | Taylor, Jeffrey, Hurley, Heather |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Boston, Mass. :
Cengage Learning,
2010.
|
Edição: | 1st Ed. |
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Fighting computer crime : a new framework for protecting information /
Por: Parker, Donn B.
Publicado em: (1998)
Por: Parker, Donn B.
Publicado em: (1998)
Risk factors in computer-crime victimization
Por: Choi, Kyung-shick, 1973-
Publicado em: (2010)
Por: Choi, Kyung-shick, 1973-
Publicado em: (2010)
Cybercrime and society crime and punishment in the information age /
Por: Yar, Majid
Publicado em: (2006)
Por: Yar, Majid
Publicado em: (2006)
Invisible threats financial and information technology crimes and national security /
Publicado em: (2006)
Publicado em: (2006)
Hate crime and the city
Por: Iganski, Paul
Publicado em: (2008)
Por: Iganski, Paul
Publicado em: (2008)
Sanctioning bias crime a public perspective /
Por: Pearlman, Terrylynn, 1971-
Publicado em: (2008)
Por: Pearlman, Terrylynn, 1971-
Publicado em: (2008)
Policing cyberspace a structural and cultural analysis /
Por: Nhan, Johnny, 1977-
Publicado em: (2010)
Por: Nhan, Johnny, 1977-
Publicado em: (2010)
Markets for cybercrime tools and stolen data : hackers' bazaar /
Por: Ablon, Lillian
Publicado em: (2014)
Por: Ablon, Lillian
Publicado em: (2014)
Music piracy and crime theory
Por: Hinduja, Sameer, 1978-
Publicado em: (2006)
Por: Hinduja, Sameer, 1978-
Publicado em: (2006)
Cybercrime and cyberwarfare /
Por: Bernik, Igor
Publicado em: (2014)
Por: Bernik, Igor
Publicado em: (2014)
Alternate data storage forensics
Por: Cohen, Tyler
Publicado em: (2007)
Por: Cohen, Tyler
Publicado em: (2007)
The best damn cybercrime and digital forensics book period
Por: Cardwell, Kevin
Publicado em: (2007)
Por: Cardwell, Kevin
Publicado em: (2007)
Piracy : leakages from modernity /
Publicado em: (2014)
Publicado em: (2014)
Internet fraud casebook the World Wide Web of deceit /
Publicado em: (2010)
Publicado em: (2010)
H4ckers5 wanted : an examination of the cybersecurity labor market /
Por: Libicki, Martin C., et al.
Publicado em: (2014)
Por: Libicki, Martin C., et al.
Publicado em: (2014)
The dark sides of the Internet : on cyber threats and information warfare /
Por: Heickerö, Roland
Publicado em: (2013)
Por: Heickerö, Roland
Publicado em: (2013)
Devil's sanctuary an eyewitness history of Mississippi hate crimes /
Por: Alston, Alex A., 1936-
Publicado em: (2009)
Por: Alston, Alex A., 1936-
Publicado em: (2009)
The economic costs and implications of high-technology hardware theft
Por: Dertouzos, James N., 1950-
Publicado em: (1999)
Por: Dertouzos, James N., 1950-
Publicado em: (1999)
Cyber risks for business professionals a management guide /
Por: Kendrick, Rupert
Publicado em: (2010)
Por: Kendrick, Rupert
Publicado em: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
Por: Mehan, Julie E.
Publicado em: (2008)
Por: Mehan, Julie E.
Publicado em: (2008)
The Emerald international handbook of technology-facilitated violence and abuse /
Por: Bailey, Jane, et al.
Publicado em: (2021)
Por: Bailey, Jane, et al.
Publicado em: (2021)
Steal this computer book 3 what they won't tell you about the Internet /
Por: Wang, Wally
Publicado em: (2003)
Por: Wang, Wally
Publicado em: (2003)
Internet governance in an age of cyber insecurity
Por: Knake, Robert K.
Publicado em: (2010)
Por: Knake, Robert K.
Publicado em: (2010)
Murder, the media, and the politics of public feelings remembering Matthew Shepard and James Byrd Jr. /
Por: Petersen, Jennifer, 1970-
Publicado em: (2011)
Por: Petersen, Jennifer, 1970-
Publicado em: (2011)
Computer crimes and digital investigations /
Por: Walden, Ian
Publicado em: (2016)
Por: Walden, Ian
Publicado em: (2016)
Investigating internet crimes : an introduction to solving crimes in cyberspace /
Por: Shipley, Todd G.
Publicado em: (2014)
Por: Shipley, Todd G.
Publicado em: (2014)
Biohackers the politics of open science /
Por: Delfanti, Alessandro
Publicado em: (2013)
Por: Delfanti, Alessandro
Publicado em: (2013)
The defendeŕs dilemma : charting a course toward cybersecurity /
Por: Libicki, Martin C., et al.
Publicado em: (2015)
Por: Libicki, Martin C., et al.
Publicado em: (2015)
Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors /
Por: Reyes, Anthony
Publicado em: (2007)
Por: Reyes, Anthony
Publicado em: (2007)
The anti-social network cyberstalking victimization among college students /
Por: Reyns, Bradford W., 1979-
Publicado em: (2012)
Por: Reyns, Bradford W., 1979-
Publicado em: (2012)
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 July 2012 /
Publicado em: (2012)
Publicado em: (2012)
The browser hacker's handbook /
Por: Alcorn, Wade
Publicado em: (2014)
Por: Alcorn, Wade
Publicado em: (2014)
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Publicado em: (2012)
Publicado em: (2012)
Cyber blockades /
Por: Russell, Alison Lawlor
Publicado em: (2014)
Por: Russell, Alison Lawlor
Publicado em: (2014)
The Antivirus hacker's handbook /
Por: Koret, Joxean, et al.
Publicado em: (2015)
Por: Koret, Joxean, et al.
Publicado em: (2015)
Critical infrastructure protection /
Publicado em: (2014)
Publicado em: (2014)
Computer crime law /
Por: Kerr, Orin S.
Publicado em: (2013)
Por: Kerr, Orin S.
Publicado em: (2013)
Networks and netwars the future of terror, crime, and militancy /
Publicado em: (2001)
Publicado em: (2001)
Cyber crime and cyber terrorism investigator's handbook /
Publicado em: (2014)
Publicado em: (2014)
Investigative computer forensics the practical guide for lawyers, accountants, investigators, and business executives /
Por: Laykin, Erik
Publicado em: (2013)
Por: Laykin, Erik
Publicado em: (2013)
Registos relacionados
-
Fighting computer crime : a new framework for protecting information /
Por: Parker, Donn B.
Publicado em: (1998) -
Risk factors in computer-crime victimization
Por: Choi, Kyung-shick, 1973-
Publicado em: (2010) -
Cybercrime and society crime and punishment in the information age /
Por: Yar, Majid
Publicado em: (2006) -
Invisible threats financial and information technology crimes and national security /
Publicado em: (2006) -
Hate crime and the city
Por: Iganski, Paul
Publicado em: (2008)