Cyber crime, security and digital intelligence
In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
[date of publication is not identified]
Gower Publishing
2013
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | HV 6773 .J64 2013 |
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 104502 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220041943.0 | ||
| 008 | 221104 20132013xxka bi 001 0 eng d | ||
| 020 | |a 9781409454496 | ||
| 039 | 9 | |a 202211041210 |b VLOAD |c 201901141141 |d faezah |y 201809201142 |z helmey | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a HV 6773 |b .J64 2013 | ||
| 100 | 1 | |a Johnson, Mark |e author | |
| 245 | 1 | 0 | |a Cyber crime, security and digital intelligence |c Mark Johnson |
| 264 | 1 | |a [date of publication is not identified] |b Gower Publishing |c 2013 | |
| 264 | 4 | |c © 2013 | |
| 300 | |a xlv, 252 pages |b illustrations |c 25 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 505 | 0 | |a pt. I. The cybercrime challenge --pt. II. The cyber security response | |
| 520 | |a In Cyber Crime, Security and Digital Intelligence, his second book on high technology risks, Mark Johnson goes far beyond enumerating past cases and summarising the requirements of data protection law, payment card industry or ISO standards | ||
| 592 | |a 00012905/18 |b 26/11/2018 |c RM 376.72 |h Areesh | ||
| 650 | 0 | |a Computer crimes | |
| 650 | 0 | |a Cyberterrorism | |
| 650 | 0 | |a Computer security | |
| 650 | 0 | |a Computer networks |x Security measures | |
| 999 | |a vtls000061540 |c 104502 |d 104502 | ||


