Jenayah digital daripada penyelidikan kepada penyelesaian
Saved in:
| Main Authors: | Syahrul Nizam Junaini 1977- (Author), Muhammad Asyraf Khairuddin 1981- (Author) |
|---|---|
| Format: | Book |
| Language: | Malay |
| Published: |
Kota Samarahan, Sarawak
Penerbit Universiti Malaysia Sarawak
2014
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Policing digital crime
Published: (2014)
Published: (2014)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Jenayah cinta cyber
by: Azianura Hani Shaari, et al.
Published: (2018)
by: Azianura Hani Shaari, et al.
Published: (2018)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000)
by: Casey
Published: (2000)
Profiling hackers
by: Chiesa, Raoul 1973-
Published: (2009)
by: Chiesa, Raoul 1973-
Published: (2009)
Cybercrime and society
by: Yar, Majid
Published: (2013)
by: Yar, Majid
Published: (2013)
Islamophobia in cyberspace hate crimes go viral
Published: (2020)
Published: (2020)
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011)
by: Gragido, Will, et al.
Published: (2011)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Jenayah berkaitan dengan komputer perspektif undang-undang Malaysia
by: Anita Abdul Rahim
Published: (2004)
by: Anita Abdul Rahim
Published: (2004)
Buli siber : suatu bencana sosial
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
Cyber law and computer crimes
by: Nagia, Rajan 1970-
Published: (2009)
by: Nagia, Rajan 1970-
Published: (2009)
Cyber security culture counteracting cyber threats through organizational learning and training /cby Peter Trim and David Upton
by: Trim, Peter R. J.
Published: (2013)
by: Trim, Peter R. J.
Published: (2013)
Confronting Cyberespionage Under International Law /
by: Pehlivan, Oguz Kaan
Published: (2019)
by: Pehlivan, Oguz Kaan
Published: (2019)
Cyber crime and digital evidence
Published: (2015)
Published: (2015)
Principles of information security
by: Whitman, Michael E., et al.
Published: (2012)
by: Whitman, Michael E., et al.
Published: (2012)
Principles of information security
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
by: Whitman, Michael E. 1964-, et al.
Published: (2009)
Information security handbook develop a threat model and incident response strategy to build a strong information security framework
by: Death, Darren
Published: (2017)
by: Death, Darren
Published: (2017)
Cyber operations and the use of force in international law
by: Roscini, Marco
Published: (2014)
by: Roscini, Marco
Published: (2014)
Cyberlaw and its implication
by: Surin
Published: (2006)
by: Surin
Published: (2006)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
Emerging trends in ICT security
Published: (2014)
Published: (2014)
COPING STRATEGY MODEL OF CYBERBULLY VICTIMS AMONG UNIVERSITY STUDENTS
by: Mohammad Aminul Haq Mohd Ghazali
Published: (2022)
by: Mohammad Aminul Haq Mohd Ghazali
Published: (2022)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
A study on the collaboration of cyber terror response policy of South Korea-U.S.
by: Lee, Eun Kyeong
by: Lee, Eun Kyeong
Cybersecurity public sector threats and responses
Published: (2012)
Published: (2012)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Hands-on cybersecurity for architects plan and design robust security architectures
by: Rerup, Neil, et al.
Published: (2018)
by: Rerup, Neil, et al.
Published: (2018)
Intelligent systems for security informatics
Published: (2013)
Published: (2013)
Crimeware understanding new attacks and defenses
Published: (2008)
Published: (2008)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Similar Items
-
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013) -
National security and counterintelligence in the era of cyber espionage
Published: (2016) -
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015) -
Combating security breaches and criminal activity in the digital sphere
Published: (2016) -
Policing digital crime
Published: (2014)


