The anti-social network cyberstalking victimization among college students /
Na minha lista:
Autor principal: | Reyns, Bradford W., 1979- |
---|---|
Autor Corporativo: | ebrary, Inc |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
El Paso :
LFB Scholarly Pub.,
2012.
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Die rechtliche Regulierung der Menschenfleischsuche im Internet : Eine rechtsvergleichende Untersuchung zwischen Deutschland und China /
Por: Zhao, Xiaopeng
Publicado em: (2015)
Por: Zhao, Xiaopeng
Publicado em: (2015)
Risk factors in computer-crime victimization
Por: Choi, Kyung-shick, 1973-
Publicado em: (2010)
Por: Choi, Kyung-shick, 1973-
Publicado em: (2010)
Fighting computer crime : a new framework for protecting information /
Por: Parker, Donn B.
Publicado em: (1998)
Por: Parker, Donn B.
Publicado em: (1998)
Biohackers the politics of open science /
Por: Delfanti, Alessandro
Publicado em: (2013)
Por: Delfanti, Alessandro
Publicado em: (2013)
Networks and netwars the future of terror, crime, and militancy /
Publicado em: (2001)
Publicado em: (2001)
Cybercrime and society crime and punishment in the information age /
Por: Yar, Majid
Publicado em: (2006)
Por: Yar, Majid
Publicado em: (2006)
Computer crime, investigation, and the law
Por: Easttom, William C.
Publicado em: (2010)
Por: Easttom, William C.
Publicado em: (2010)
The defendeŕs dilemma : charting a course toward cybersecurity /
Por: Libicki, Martin C., et al.
Publicado em: (2015)
Por: Libicki, Martin C., et al.
Publicado em: (2015)
Policing cyberspace a structural and cultural analysis /
Por: Nhan, Johnny, 1977-
Publicado em: (2010)
Por: Nhan, Johnny, 1977-
Publicado em: (2010)
Invisible threats financial and information technology crimes and national security /
Publicado em: (2006)
Publicado em: (2006)
Cyber risks for business professionals a management guide /
Por: Kendrick, Rupert
Publicado em: (2010)
Por: Kendrick, Rupert
Publicado em: (2010)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
Por: Mehan, Julie E.
Publicado em: (2008)
Por: Mehan, Julie E.
Publicado em: (2008)
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 July 2012 /
Publicado em: (2012)
Publicado em: (2012)
Markets for cybercrime tools and stolen data : hackers' bazaar /
Por: Ablon, Lillian
Publicado em: (2014)
Por: Ablon, Lillian
Publicado em: (2014)
The dark sides of the Internet : on cyber threats and information warfare /
Por: Heickerö, Roland
Publicado em: (2013)
Por: Heickerö, Roland
Publicado em: (2013)
Steal this computer book 3 what they won't tell you about the Internet /
Por: Wang, Wally
Publicado em: (2003)
Por: Wang, Wally
Publicado em: (2003)
The browser hacker's handbook /
Por: Alcorn, Wade
Publicado em: (2014)
Por: Alcorn, Wade
Publicado em: (2014)
Cybercrime and cyberwarfare /
Por: Bernik, Igor
Publicado em: (2014)
Por: Bernik, Igor
Publicado em: (2014)
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Publicado em: (2012)
Publicado em: (2012)
Alternate data storage forensics
Por: Cohen, Tyler
Publicado em: (2007)
Por: Cohen, Tyler
Publicado em: (2007)
The best damn cybercrime and digital forensics book period
Por: Cardwell, Kevin
Publicado em: (2007)
Por: Cardwell, Kevin
Publicado em: (2007)
Piracy : leakages from modernity /
Publicado em: (2014)
Publicado em: (2014)
Internet fraud casebook the World Wide Web of deceit /
Publicado em: (2010)
Publicado em: (2010)
Cyber blockades /
Por: Russell, Alison Lawlor
Publicado em: (2014)
Por: Russell, Alison Lawlor
Publicado em: (2014)
The Antivirus hacker's handbook /
Por: Koret, Joxean, et al.
Publicado em: (2015)
Por: Koret, Joxean, et al.
Publicado em: (2015)
H4ckers5 wanted : an examination of the cybersecurity labor market /
Por: Libicki, Martin C., et al.
Publicado em: (2014)
Por: Libicki, Martin C., et al.
Publicado em: (2014)
Critical infrastructure protection /
Publicado em: (2014)
Publicado em: (2014)
The economic costs and implications of high-technology hardware theft
Por: Dertouzos, James N., 1950-
Publicado em: (1999)
Por: Dertouzos, James N., 1950-
Publicado em: (1999)
Music piracy and crime theory
Por: Hinduja, Sameer, 1978-
Publicado em: (2006)
Por: Hinduja, Sameer, 1978-
Publicado em: (2006)
Internet governance in an age of cyber insecurity
Por: Knake, Robert K.
Publicado em: (2010)
Por: Knake, Robert K.
Publicado em: (2010)
Studying smart : time management for college students /
Por: Scharf-Hunt, Diana, 1948-
Publicado em: (1985)
Por: Scharf-Hunt, Diana, 1948-
Publicado em: (1985)
Healthy cooking & nutrition for college students : how not to gain the freshman 15 /
Por: Sack, Rebekah, 1994-, et al.
Publicado em: (2016)
Por: Sack, Rebekah, 1994-, et al.
Publicado em: (2016)
The Emerald international handbook of technology-facilitated violence and abuse /
Por: Bailey, Jane, et al.
Publicado em: (2021)
Por: Bailey, Jane, et al.
Publicado em: (2021)
Cyberbullying activities to help children and teens to stay safe in a texting, twittering, social networking world /
Por: Rogers, Vanessa
Publicado em: (2010)
Por: Rogers, Vanessa
Publicado em: (2010)
Student learning in college residence halls : what works, what doesn't, and why /
Por: Blimling, Gregory S.
Publicado em: (2015)
Por: Blimling, Gregory S.
Publicado em: (2015)
College knowledge for the Jewish student 101 tips /
Por: Schoem, David Louis
Publicado em: (2010)
Por: Schoem, David Louis
Publicado em: (2010)
Anxiety in college students
Publicado em: (2009)
Publicado em: (2009)
College student mental health counseling : a developmental approach /
Publicado em: (2014)
Publicado em: (2014)
How college works /
Por: Chambliss, Daniel F., 1953-
Publicado em: (2014)
Por: Chambliss, Daniel F., 1953-
Publicado em: (2014)
How to be a student 100 great ideas and practical habits for students everywhere /
Por: Moore, Sarah
Publicado em: (2005)
Por: Moore, Sarah
Publicado em: (2005)
Registos relacionados
-
Die rechtliche Regulierung der Menschenfleischsuche im Internet : Eine rechtsvergleichende Untersuchung zwischen Deutschland und China /
Por: Zhao, Xiaopeng
Publicado em: (2015) -
Risk factors in computer-crime victimization
Por: Choi, Kyung-shick, 1973-
Publicado em: (2010) -
Fighting computer crime : a new framework for protecting information /
Por: Parker, Donn B.
Publicado em: (1998) -
Biohackers the politics of open science /
Por: Delfanti, Alessandro
Publicado em: (2013) -
Networks and netwars the future of terror, crime, and militancy /
Publicado em: (2001)