Jenayah cinta cyber
Saved in:
| Main Authors: | Azianura Hani Shaari (Author), Yeap, Yoke Peng (Author), Mohammad Rahim Kamaluddin (Author) |
|---|---|
| Format: | Book |
| Language: | Malay |
| Published: |
Bangi, Selangor
Penerbit Universiti Kebangsaan Malaysia
2018
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Social networking communities and e-dating services concepts and implications /
Published: (2009)
Published: (2009)
Buli siber : suatu bencana sosial
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Jenayah digital daripada penyelidikan kepada penyelesaian
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Policing digital crime
Published: (2014)
Published: (2014)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Cybercrime and society
by: Yar, Majid
Published: (2013)
by: Yar, Majid
Published: (2013)
Soliving the year 2000 crisis
by: McDermott lhPatrich
by: McDermott lhPatrich
Surviving the computer time bomb How to plan for and recover from the Y2K explosion
by: Zetlin lhMinda
by: Zetlin lhMinda
Managing the millennium bug and its implication for your organizations
by: LevylhMike
by: LevylhMike
Time bomb 2000 what the year 2000 computer crisis means to you!
by: Yourdon
by: Yourdon
Y2K technical reference for NT server solutions for NT server,backoffice,and non-NT network applications
Published: (1999)
Published: (1999)
Y2K solutions for microsoft products
Published: (1999)
Published: (1999)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
Islamophobia in cyberspace hate crimes go viral
Published: (2020)
Published: (2020)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
The millennium time bomb a practical guide to the technical and legal issues
by: Bramley, Caroline
Published: (1998)
by: Bramley, Caroline
Published: (1998)
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000)
by: Casey
Published: (2000)
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Profiling hackers
by: Chiesa, Raoul 1973-
Published: (2009)
by: Chiesa, Raoul 1973-
Published: (2009)
Y2K risk management contingency planning, business continuity, and avoiding litigation
by: Goldberg
Published: (1999)
by: Goldberg
Published: (1999)
Y2K procrastinator's guide
Published: (2000)
Published: (2000)
Countdown 2000 the Y2K challenge strategies,methodologies and solutions
by: Leon
Published: (1998)
by: Leon
Published: (1998)
The year 2000 software crisis challenge of the century
by: Ulrich
by: Ulrich
The year 2000 problem solver a five-step disaster prevention plan
by: Rayland
Published: (1997)
by: Rayland
Published: (1997)
The year 2000 computing crisis a millennium date conversion plan
by: Murray, Jerome T.
Published: (1996)
by: Murray, Jerome T.
Published: (1996)
The year 2000 software problem quantifying the costs and assessing the consequences
by: Jones
by: Jones
Countdown Y2K business survival planning for the year 2000
by: De Jager
Published: (1999)
by: De Jager
Published: (1999)
Exodus to Arthur : catastrophic encounters with comets
by: Baillie, Mike
Published: (1999)
by: Baillie, Mike
Published: (1999)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Modern romance
by: Ansari, Aziz 1983-, et al.
Published: (2015)
by: Ansari, Aziz 1983-, et al.
Published: (2015)
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011)
by: Gragido, Will, et al.
Published: (2011)
How to profit from the Y2K recession by converting the year 2000 crisis into an opportunity for your investments and business
by: Mauldin
Published: (1999)
by: Mauldin
Published: (1999)
Evaluating the year 2000 project a management guide for determinting reasonable care
by: Braithwaite, Timoyhy
Published: (1998)
by: Braithwaite, Timoyhy
Published: (1998)
How to find the love of your life A step by step program that really workc
by: Dominitz lhBen
by: Dominitz lhBen
Similar Items
-
Social networking communities and e-dating services concepts and implications /
Published: (2009) -
Buli siber : suatu bencana sosial
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019) -
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013) -
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015) -
Jenayah digital daripada penyelidikan kepada penyelesaian
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)


