The anti-social network cyberstalking victimization among college students /
Saved in:
Main Author: | Reyns, Bradford W., 1979- |
---|---|
Corporate Author: | ebrary, Inc |
Format: | Electronic eBook |
Language: | English |
Published: |
El Paso :
LFB Scholarly Pub.,
2012.
|
Subjects: | |
Online Access: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Die rechtliche Regulierung der Menschenfleischsuche im Internet : Eine rechtsvergleichende Untersuchung zwischen Deutschland und China /
by: Zhao, Xiaopeng
Published: (2015)
by: Zhao, Xiaopeng
Published: (2015)
Risk factors in computer-crime victimization
by: Choi, Kyung-shick, 1973-
Published: (2010)
by: Choi, Kyung-shick, 1973-
Published: (2010)
Fighting computer crime : a new framework for protecting information /
by: Parker, Donn B.
Published: (1998)
by: Parker, Donn B.
Published: (1998)
Biohackers the politics of open science /
by: Delfanti, Alessandro
Published: (2013)
by: Delfanti, Alessandro
Published: (2013)
Networks and netwars the future of terror, crime, and militancy /
Published: (2001)
Published: (2001)
Cybercrime and society crime and punishment in the information age /
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Computer crime, investigation, and the law
by: Easttom, William C.
Published: (2010)
by: Easttom, William C.
Published: (2010)
The defendeŕs dilemma : charting a course toward cybersecurity /
by: Libicki, Martin C., et al.
Published: (2015)
by: Libicki, Martin C., et al.
Published: (2015)
Policing cyberspace a structural and cultural analysis /
by: Nhan, Johnny, 1977-
Published: (2010)
by: Nhan, Johnny, 1977-
Published: (2010)
Invisible threats financial and information technology crimes and national security /
Published: (2006)
Published: (2006)
Cyber risks for business professionals a management guide /
by: Kendrick, Rupert
Published: (2010)
by: Kendrick, Rupert
Published: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
by: Mehan, Julie E.
Published: (2008)
by: Mehan, Julie E.
Published: (2008)
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 July 2012 /
Published: (2012)
Published: (2012)
Markets for cybercrime tools and stolen data : hackers' bazaar /
by: Ablon, Lillian
Published: (2014)
by: Ablon, Lillian
Published: (2014)
The dark sides of the Internet : on cyber threats and information warfare /
by: Heickerö, Roland
Published: (2013)
by: Heickerö, Roland
Published: (2013)
Steal this computer book 3 what they won't tell you about the Internet /
by: Wang, Wally
Published: (2003)
by: Wang, Wally
Published: (2003)
The browser hacker's handbook /
by: Alcorn, Wade
Published: (2014)
by: Alcorn, Wade
Published: (2014)
Cybercrime and cyberwarfare /
by: Bernik, Igor
Published: (2014)
by: Bernik, Igor
Published: (2014)
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Published: (2012)
Published: (2012)
Alternate data storage forensics
by: Cohen, Tyler
Published: (2007)
by: Cohen, Tyler
Published: (2007)
The best damn cybercrime and digital forensics book period
by: Cardwell, Kevin
Published: (2007)
by: Cardwell, Kevin
Published: (2007)
Piracy : leakages from modernity /
Published: (2014)
Published: (2014)
Internet fraud casebook the World Wide Web of deceit /
Published: (2010)
Published: (2010)
Cyber blockades /
by: Russell, Alison Lawlor
Published: (2014)
by: Russell, Alison Lawlor
Published: (2014)
The Antivirus hacker's handbook /
by: Koret, Joxean, et al.
Published: (2015)
by: Koret, Joxean, et al.
Published: (2015)
H4ckers5 wanted : an examination of the cybersecurity labor market /
by: Libicki, Martin C., et al.
Published: (2014)
by: Libicki, Martin C., et al.
Published: (2014)
Critical infrastructure protection /
Published: (2014)
Published: (2014)
The economic costs and implications of high-technology hardware theft
by: Dertouzos, James N., 1950-
Published: (1999)
by: Dertouzos, James N., 1950-
Published: (1999)
Music piracy and crime theory
by: Hinduja, Sameer, 1978-
Published: (2006)
by: Hinduja, Sameer, 1978-
Published: (2006)
Internet governance in an age of cyber insecurity
by: Knake, Robert K.
Published: (2010)
by: Knake, Robert K.
Published: (2010)
The Emerald international handbook of technology-facilitated violence and abuse /
by: Bailey, Jane, et al.
Published: (2021)
by: Bailey, Jane, et al.
Published: (2021)
Cyberbullying activities to help children and teens to stay safe in a texting, twittering, social networking world /
by: Rogers, Vanessa
Published: (2010)
by: Rogers, Vanessa
Published: (2010)
Studying smart : time management for college students /
by: Scharf-Hunt, Diana, 1948-
Published: (1985)
by: Scharf-Hunt, Diana, 1948-
Published: (1985)
Healthy cooking & nutrition for college students : how not to gain the freshman 15 /
by: Sack, Rebekah, 1994-, et al.
Published: (2016)
by: Sack, Rebekah, 1994-, et al.
Published: (2016)
Student learning in college residence halls : what works, what doesn't, and why /
by: Blimling, Gregory S.
Published: (2015)
by: Blimling, Gregory S.
Published: (2015)
College knowledge for the Jewish student 101 tips /
by: Schoem, David Louis
Published: (2010)
by: Schoem, David Louis
Published: (2010)
Anxiety in college students
Published: (2009)
Published: (2009)
College student mental health counseling : a developmental approach /
Published: (2014)
Published: (2014)
How to measure anything in cybersecurity risk /
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
by: Hubbard, Douglas W., 1962-, et al.
Published: (2016)
How college works /
by: Chambliss, Daniel F., 1953-
Published: (2014)
by: Chambliss, Daniel F., 1953-
Published: (2014)
Similar Items
-
Die rechtliche Regulierung der Menschenfleischsuche im Internet : Eine rechtsvergleichende Untersuchung zwischen Deutschland und China /
by: Zhao, Xiaopeng
Published: (2015) -
Risk factors in computer-crime victimization
by: Choi, Kyung-shick, 1973-
Published: (2010) -
Fighting computer crime : a new framework for protecting information /
by: Parker, Donn B.
Published: (1998) -
Biohackers the politics of open science /
by: Delfanti, Alessandro
Published: (2013) -
Networks and netwars the future of terror, crime, and militancy /
Published: (2001)