Torthaí cuardaigh
Topaicí molta laistigh de do chuardach.
Topaicí molta laistigh de do chuardach.
- Computer crimes
- Security measures 56
- Investigation 42
- Prevention 40
- Computer networks 38
- Computer security 38
- Internet 22
- Cyberterrorism 16
- Social aspects 12
- Computer hackers 10
- Cyberspace 10
- Data protection 10
- Evidence, Criminal 10
- Forensic sciences 10
- Information warfare 10
- Corporations 8
- Law and legislation 8
- Government policy 6
- Information technology 6
- Political aspects 6
- Standards 6
- Bullying in schools 4
- Business enterprises 4
- Criminal investigation 4
- Criminology 4
- Cyberbullying 4
- Economic aspects 4
- Electronic commerce 4
- Electronic evidence 4
- Electronic surveillance 4
-
1
-
2
Fighting computer crime : a new framework for protecting information /
Foilsithe / Cruthaithe 1998Table of Contents
Contributor biographical information
Publisher description
LEABHAR -
3
-
4
The economic costs and implications of high-technology hardware theft
Foilsithe / Cruthaithe 1999An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
5
Crackproof your software the best ways to protect your software against crackers /
Foilsithe / Cruthaithe 2002An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
6
Rights and responsibilities of participants in networked communities
Foilsithe / Cruthaithe 1994An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
7
Software piracy exposed
Foilsithe / Cruthaithe 2005An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
8
Stealing the network how to own an identity /
Foilsithe / Cruthaithe 2005An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
9
Cyber criminals on trial
Foilsithe / Cruthaithe 2004An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
10
Invisible threats financial and information technology crimes and national security /
Foilsithe / Cruthaithe 2006An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
11
CD and DVD forensics
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
12
Music piracy and crime theory
Foilsithe / Cruthaithe 2006An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
13
Search and seizure of digital evidence
Foilsithe / Cruthaithe 2005An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
14
Zen and the art of information security
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
15
Alternate data storage forensics
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
16
Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors /
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
17
Windows forensic analysis DVD toolkit, /
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
18
The best damn cybercrime and digital forensics book period
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
19
Computer evidence collection & preservation /
Foilsithe / Cruthaithe 2006An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar -
20
Techno security's guide to e-discovery and digital forensics
Foilsithe / Cruthaithe 2007An electronic book accessible through the World Wide Web; click to view
Leictreonach Ríomhleabhar