Fighting computer crime a new framework for protecting information
Saved in:
| Main Author: | Parker |
|---|---|
| Format: | Book |
| Published: |
New York
John Wiley & Sons
1998
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Policing digital crime
Published: (2014)
Published: (2014)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000)
by: Casey
Published: (2000)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Islamophobia in cyberspace hate crimes go viral
Published: (2020)
Published: (2020)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Cybercrime and society
by: Yar, Majid
Published: (2013)
by: Yar, Majid
Published: (2013)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Profiling hackers
by: Chiesa, Raoul 1973-
Published: (2009)
by: Chiesa, Raoul 1973-
Published: (2009)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Jenayah digital daripada penyelidikan kepada penyelesaian
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011)
by: Gragido, Will, et al.
Published: (2011)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Computer forensics and cyber crime an introduction
by: Britz, Marjie T.
Published: (2009)
by: Britz, Marjie T.
Published: (2009)
Buli siber : suatu bencana sosial
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
Jenayah cinta cyber
by: Azianura Hani Shaari, et al.
Published: (2018)
by: Azianura Hani Shaari, et al.
Published: (2018)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Sailing safe in cyberspace protect your identity and data
by: Kaushik, Anjali
Published: (2013)
by: Kaushik, Anjali
Published: (2013)
Cyber security practitioner's guide
Published: (2020)
Published: (2020)
Computer forensics principles and practices/
by: Volonino, Linda
Published: (2007)
by: Volonino, Linda
Published: (2007)
Cyber crime and legal issues
by: Augastine, Paul T.
Published: (2008)
by: Augastine, Paul T.
Published: (2008)
Crime prevention theory and practice
by: Schneider, Stephen
Published: (2015)
by: Schneider, Stephen
Published: (2015)
Cybersecurity wellness index evaluation framework for critical organisations
by: Husin Jazri
Published: (2019)
by: Husin Jazri
Published: (2019)
Transnational Organized Crime as a threat to Malaysia an analysis
by: Satish Kumar Suppiah
Published: (2019)
by: Satish Kumar Suppiah
Published: (2019)
Investigating internet crimes an introduction to solving crimes in cyberspace
by: Shipley, Todd G, et al.
Published: (2014)
by: Shipley, Todd G, et al.
Published: (2014)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
Hacking exposed computer forensics
by: Philipp, Aaron
Published: (2010)
by: Philipp, Aaron
Published: (2010)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2020)
by: Nelson, Bill, et al.
Published: (2020)
Incident response & computer forensics Jason T. Luttgens, Matthew Pepe and Kevin Mandia
by: Pepe, Matthew
Published: (2014)
by: Pepe, Matthew
Published: (2014)
Computer incident response and forensics team management conducting a successful incident response
by: Johnson, Leighton
Published: (2014)
by: Johnson, Leighton
Published: (2014)
Network security attacks and countermeasures
Published: (2016)
Published: (2016)
Crime prevention through environmental design
by: Crowe, Timothy D
Published: (2013)
by: Crowe, Timothy D
Published: (2013)
Countering cyber attacks and preserving the integrity and availability of critical systems
Published: (2019)
Published: (2019)
Cyber crime investigations Bridging the gaps between security professionals,law enforcement and prosecutors
by: Reyes
Published: (2007)
by: Reyes
Published: (2007)
Cyber security and threats concepts, methodologies, tools, and applications
Published: (2018)
Published: (2018)
Forensic examination of windows-supported file systems
by: Elrick, Doug
Published: (2016)
by: Elrick, Doug
Published: (2016)
Real digital forensics computer security and incident response
by: Jones (Keith John)
Published: (2005)
by: Jones (Keith John)
Published: (2005)
Similar Items
-
Policing digital crime
Published: (2014) -
Combating security breaches and criminal activity in the digital sphere
Published: (2016) -
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000) -
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013) -
Cyber insecurity navigating the perils of the next information age
Published: (2016)


