Cybercrime and society
A critical and systematic introduction, this second edition has been updated to now cover Child Pornography and Policing the Internet, making it the ideal resource for those wanting an up-to-date and authoritative account on this rapidly growing field.
Saved in:
| Main Author: | Yar, Majid |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Los Angeles
SAGE
2013
|
| Edition: | 2nd ed. |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
by: Holt, Thomas J., 1978-, et al.
Published: (2015)
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011)
by: Gragido, Will, et al.
Published: (2011)
Policing digital crime
Published: (2014)
Published: (2014)
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998)
by: Parker
Published: (1998)
Islamophobia in cyberspace hate crimes go viral
Published: (2020)
Published: (2020)
Combating security breaches and criminal activity in the digital sphere
Published: (2016)
Published: (2016)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Digital evidence and computer crime forensic science,computers and the internet
by: Casey
Published: (2000)
by: Casey
Published: (2000)
Information warfare
by: Anil, K.C
Published: (2009)
by: Anil, K.C
Published: (2009)
Cyber crime, security and digital intelligence
by: Johnson, Mark
Published: (2013)
by: Johnson, Mark
Published: (2013)
Kisah benar cyber 999 kompilasi coretan hidup di alam siber
Published: (2015)
Published: (2015)
Profiling hackers
by: Chiesa, Raoul 1973-
Published: (2009)
by: Chiesa, Raoul 1973-
Published: (2009)
Buli siber : suatu bencana sosial
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
by: Mohammad Rahim Kamaluddin, et al.
Published: (2019)
Jenayah digital daripada penyelidikan kepada penyelesaian
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
by: Syahrul Nizam Junaini 1977-, et al.
Published: (2014)
National security and counterintelligence in the era of cyber espionage
Published: (2016)
Published: (2016)
Security solutions for hyperconnectivity and the Internet of things
Published: (2017)
Published: (2017)
Cyber insecurity navigating the perils of the next information age
Published: (2016)
Published: (2016)
Jenayah cinta cyber
by: Azianura Hani Shaari, et al.
Published: (2018)
by: Azianura Hani Shaari, et al.
Published: (2018)
Cybercrime investigations the comprehensive resource for everyone
by: Bandler, John, et al.
Published: (2020)
by: Bandler, John, et al.
Published: (2020)
Scene of the cybercrime computer forensics
Published: (2015)
Published: (2015)
Practical cyber intelligence how action-based intelligence can be an effective response to incidents
by: Bautista, Wilson
Published: (2018)
by: Bautista, Wilson
Published: (2018)
COPING STRATEGY MODEL OF CYBERBULLY VICTIMS AMONG UNIVERSITY STUDENTS
by: Mohammad Aminul Haq Mohd Ghazali
Published: (2022)
by: Mohammad Aminul Haq Mohd Ghazali
Published: (2022)
Encyclopedia of cybercrime
Published: (2009)
Published: (2009)
Cyber-war :bthe anatomy of the global security threat
by: Richards, Julian
Published: (2014)
by: Richards, Julian
Published: (2014)
A history of cyber security attacks 1980 to present
by: Middleton, Bruce
Published: (2017)
by: Middleton, Bruce
Published: (2017)
A study on the collaboration of cyber terror response policy of South Korea-U.S.
by: Lee, Eun Kyeong
by: Lee, Eun Kyeong
Utilization of new technologies in global terror emerging research and opportunities
by: Stacey, Emily 1984
Published: (2019)
by: Stacey, Emily 1984
Published: (2019)
Cyber war the next threat to national security and what to do about it
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
by: Clarke, Richard A. (Richard Alan) 1951-, et al.
Published: (2010)
Managing cyber threats
Published: (2015)
Published: (2015)
Phishing dark waters the offensive and defensive sides of malicious emails
by: Hadnagy, Christopher, et al.
Published: (2015)
by: Hadnagy, Christopher, et al.
Published: (2015)
The use of cyberspace as a platform to conduct cyberterrorism a case study on ISIS
by: Ahmad Nizam Adnan
by: Ahmad Nizam Adnan
Developing safer online environments for children tools and policies for combatting cyber aggression
Published: (2020)
Published: (2020)
Cyber warfare and terrorism concepts, methodologies, tools, and applications
Published: (2020)
Published: (2020)
Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
by: Shavers, Brett
Published: (2013)
by: Shavers, Brett
Published: (2013)
Cybercrime investigation case studies an excerpt from Placing the suspect behind the keyboard
by: Shavers, Brett
Published: (2013)
by: Shavers, Brett
Published: (2013)
Cybercrime
Cyber crime and legal issues
by: Augastine, Paul T.
Published: (2008)
by: Augastine, Paul T.
Published: (2008)
Cybercrime level of awareness on online paedophile among parents in the family
by: Danishafiq Abdullah
Published: (2020)
by: Danishafiq Abdullah
Published: (2020)
Computer forensics and digital investigation with Encase Forensic v7
by: Widup, Suzanne
Published: (2014)
by: Widup, Suzanne
Published: (2014)
Digital forensics with Kali Linux perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x
by: Parasram, Shiva V. N.
Published: (2020)
by: Parasram, Shiva V. N.
Published: (2020)
Similar Items
-
Cybercrime and digital forensics an introduction
by: Holt, Thomas J., 1978-, et al.
Published: (2015) -
Cybercrime and espionage an analysis of subversive multivector threats
by: Gragido, Will, et al.
Published: (2011) -
Policing digital crime
Published: (2014) -
Fighting computer crime a new framework for protecting information
by: Parker
Published: (1998) -
Islamophobia in cyberspace hate crimes go viral
Published: (2020)


