Cyber crime, security and digital intelligence

In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards

Saved in:
Bibliographic Details
Main Author: Johnson, Mark (Author)
Format: Book
Language:English
Published: [date of publication is not identified] Gower Publishing 2013
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Call Number :HV 6773 .J64 2013

MARC

LEADER 00000nam a2200000 c 4500
001 104502
003 MY-KLNDU
005 20241220041943.0
008 221104 20132013xxka bi 001 0 eng d
020 |a 9781409454496 
039 9 |a 202211041210  |b VLOAD  |c 201901141141  |d faezah  |y 201809201142  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a HV 6773  |b .J64 2013 
100 1 |a Johnson, Mark  |e author 
245 1 0 |a Cyber crime, security and digital intelligence  |c Mark Johnson 
264 1 |a [date of publication is not identified]  |b Gower Publishing  |c 2013 
264 4 |c © 2013 
300 |a xlv, 252 pages  |b illustrations  |c 25 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
505 0 |a pt. I. The cybercrime challenge --pt. II. The cyber security response 
520 |a In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards 
592 |a 00012905/18  |b 26/11/2018  |c RM 376.72  |h Areesh 
650 0 |a Computer crimes 
650 0 |a Cyberterrorism 
650 0 |a Computer security 
650 0 |a Computer networks  |x Security measures 
999 |a vtls000061540  |c 104502  |d 104502