Risk factors in computer-crime victimization
Sábháilte in:
Príomhchruthaitheoir: | Choi, Kyung-shick, 1973- |
---|---|
Údar corparáideach: | ebrary, Inc |
Formáid: | Leictreonach Ríomhleabhar |
Teanga: | Béarla |
Foilsithe / Cruthaithe: |
El Paso [Tex.] :
LFB Scholarly Pub.,
2010.
|
Sraith: | Criminal justice (LFB Scholarly Publishing LLC)
|
Ábhair: | |
Rochtain ar líne: | An electronic book accessible through the World Wide Web; click to view |
Clibeanna: |
Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
|
Míreanna comhchosúla
Fighting computer crime : a new framework for protecting information /
de réir: Parker, Donn B.
Foilsithe / Cruthaithe: (1998)
de réir: Parker, Donn B.
Foilsithe / Cruthaithe: (1998)
Computer crime, investigation, and the law
de réir: Easttom, William C.
Foilsithe / Cruthaithe: (2010)
de réir: Easttom, William C.
Foilsithe / Cruthaithe: (2010)
Invisible threats financial and information technology crimes and national security /
Foilsithe / Cruthaithe: (2006)
Foilsithe / Cruthaithe: (2006)
Cyber risks for business professionals a management guide /
de réir: Kendrick, Rupert
Foilsithe / Cruthaithe: (2010)
de réir: Kendrick, Rupert
Foilsithe / Cruthaithe: (2010)
Cybercrime and cyberwarfare /
de réir: Bernik, Igor
Foilsithe / Cruthaithe: (2014)
de réir: Bernik, Igor
Foilsithe / Cruthaithe: (2014)
Cybercrime and society crime and punishment in the information age /
de réir: Yar, Majid
Foilsithe / Cruthaithe: (2006)
de réir: Yar, Majid
Foilsithe / Cruthaithe: (2006)
The dark sides of the Internet : on cyber threats and information warfare /
de réir: Heickerö, Roland
Foilsithe / Cruthaithe: (2013)
de réir: Heickerö, Roland
Foilsithe / Cruthaithe: (2013)
Cyberwar, cyberterror, cybercrime a guide to the role of standards in an environment of change and danger /
de réir: Mehan, Julie E.
Foilsithe / Cruthaithe: (2008)
de réir: Mehan, Julie E.
Foilsithe / Cruthaithe: (2008)
H4ckers5 wanted : an examination of the cybersecurity labor market /
de réir: Libicki, Martin C., et al.
Foilsithe / Cruthaithe: (2014)
de réir: Libicki, Martin C., et al.
Foilsithe / Cruthaithe: (2014)
Policing cyberspace a structural and cultural analysis /
de réir: Nhan, Johnny, 1977-
Foilsithe / Cruthaithe: (2010)
de réir: Nhan, Johnny, 1977-
Foilsithe / Cruthaithe: (2010)
Biohackers the politics of open science /
de réir: Delfanti, Alessandro
Foilsithe / Cruthaithe: (2013)
de réir: Delfanti, Alessandro
Foilsithe / Cruthaithe: (2013)
The economic costs and implications of high-technology hardware theft
de réir: Dertouzos, James N., 1950-
Foilsithe / Cruthaithe: (1999)
de réir: Dertouzos, James N., 1950-
Foilsithe / Cruthaithe: (1999)
Markets for cybercrime tools and stolen data : hackers' bazaar /
de réir: Ablon, Lillian
Foilsithe / Cruthaithe: (2014)
de réir: Ablon, Lillian
Foilsithe / Cruthaithe: (2014)
The defendeŕs dilemma : charting a course toward cybersecurity /
de réir: Libicki, Martin C., et al.
Foilsithe / Cruthaithe: (2015)
de réir: Libicki, Martin C., et al.
Foilsithe / Cruthaithe: (2015)
The best damn cybercrime and digital forensics book period
de réir: Cardwell, Kevin
Foilsithe / Cruthaithe: (2007)
de réir: Cardwell, Kevin
Foilsithe / Cruthaithe: (2007)
Alternate data storage forensics
de réir: Cohen, Tyler
Foilsithe / Cruthaithe: (2007)
de réir: Cohen, Tyler
Foilsithe / Cruthaithe: (2007)
Proceedings of the 11th European Conference on Information Warfare and Security : The Institute Ecole Superieure en Informatique Electronique et Automatique, Laval, France, 5-6 July 2012 /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Hate crime and the city
de réir: Iganski, Paul
Foilsithe / Cruthaithe: (2008)
de réir: Iganski, Paul
Foilsithe / Cruthaithe: (2008)
Piracy : leakages from modernity /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
Music piracy and crime theory
de réir: Hinduja, Sameer, 1978-
Foilsithe / Cruthaithe: (2006)
de réir: Hinduja, Sameer, 1978-
Foilsithe / Cruthaithe: (2006)
Cyber blockades /
de réir: Russell, Alison Lawlor
Foilsithe / Cruthaithe: (2014)
de réir: Russell, Alison Lawlor
Foilsithe / Cruthaithe: (2014)
Internet fraud casebook the World Wide Web of deceit /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Sanctioning bias crime a public perspective /
de réir: Pearlman, Terrylynn, 1971-
Foilsithe / Cruthaithe: (2008)
de réir: Pearlman, Terrylynn, 1971-
Foilsithe / Cruthaithe: (2008)
Proceedings of the 7th International Conference on Information Warfare and Security : Center for Information Assurance and Cybersecurity, University of Washington, Seattle, USA, 22-23 March 2012 /
Foilsithe / Cruthaithe: (2012)
Foilsithe / Cruthaithe: (2012)
Internet governance in an age of cyber insecurity
de réir: Knake, Robert K.
Foilsithe / Cruthaithe: (2010)
de réir: Knake, Robert K.
Foilsithe / Cruthaithe: (2010)
Steal this computer book 3 what they won't tell you about the Internet /
de réir: Wang, Wally
Foilsithe / Cruthaithe: (2003)
de réir: Wang, Wally
Foilsithe / Cruthaithe: (2003)
Critical infrastructure protection /
Foilsithe / Cruthaithe: (2014)
Foilsithe / Cruthaithe: (2014)
The Emerald international handbook of technology-facilitated violence and abuse /
de réir: Bailey, Jane, et al.
Foilsithe / Cruthaithe: (2021)
de réir: Bailey, Jane, et al.
Foilsithe / Cruthaithe: (2021)
The anti-social network cyberstalking victimization among college students /
de réir: Reyns, Bradford W., 1979-
Foilsithe / Cruthaithe: (2012)
de réir: Reyns, Bradford W., 1979-
Foilsithe / Cruthaithe: (2012)
How to measure anything in cybersecurity risk /
de réir: Hubbard, Douglas W., 1962-, et al.
Foilsithe / Cruthaithe: (2016)
de réir: Hubbard, Douglas W., 1962-, et al.
Foilsithe / Cruthaithe: (2016)
Devil's sanctuary an eyewitness history of Mississippi hate crimes /
de réir: Alston, Alex A., 1936-
Foilsithe / Cruthaithe: (2009)
de réir: Alston, Alex A., 1936-
Foilsithe / Cruthaithe: (2009)
Computer forensics for dummies
de réir: Volonino, Linda
Foilsithe / Cruthaithe: (2008)
de réir: Volonino, Linda
Foilsithe / Cruthaithe: (2008)
The browser hacker's handbook /
de réir: Alcorn, Wade
Foilsithe / Cruthaithe: (2014)
de réir: Alcorn, Wade
Foilsithe / Cruthaithe: (2014)
The Antivirus hacker's handbook /
de réir: Koret, Joxean, et al.
Foilsithe / Cruthaithe: (2015)
de réir: Koret, Joxean, et al.
Foilsithe / Cruthaithe: (2015)
Computer Forensics jumpstart
Foilsithe / Cruthaithe: (2011)
Foilsithe / Cruthaithe: (2011)
Murder, the media, and the politics of public feelings remembering Matthew Shepard and James Byrd Jr. /
de réir: Petersen, Jennifer, 1970-
Foilsithe / Cruthaithe: (2011)
de réir: Petersen, Jennifer, 1970-
Foilsithe / Cruthaithe: (2011)
The official CHFI exam 312-49 study guide for computer hacking forensics investigators.
Foilsithe / Cruthaithe: (2007)
Foilsithe / Cruthaithe: (2007)
Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy /
Foilsithe / Cruthaithe: (2010)
Foilsithe / Cruthaithe: (2010)
Computers at risk safe computing in the information age /
Foilsithe / Cruthaithe: (1991)
Foilsithe / Cruthaithe: (1991)
Zen and the art of information security
de réir: Winkler, Ira
Foilsithe / Cruthaithe: (2007)
de réir: Winkler, Ira
Foilsithe / Cruthaithe: (2007)
Míreanna comhchosúla
-
Fighting computer crime : a new framework for protecting information /
de réir: Parker, Donn B.
Foilsithe / Cruthaithe: (1998) -
Computer crime, investigation, and the law
de réir: Easttom, William C.
Foilsithe / Cruthaithe: (2010) -
Invisible threats financial and information technology crimes and national security /
Foilsithe / Cruthaithe: (2006) -
Cyber risks for business professionals a management guide /
de réir: Kendrick, Rupert
Foilsithe / Cruthaithe: (2010) -
Cybercrime and cyberwarfare /
de réir: Bernik, Igor
Foilsithe / Cruthaithe: (2014)