skip to main content
Lingue:

Risutati 1 - 10 di 35.567  per Tutte le collezioni

Risultati 1 2 3 4 5 next page
Mostra solo
Result Number Material Type Add to My Shelf Action Record Details and Options
1
الجرائم المستخدمة بطرق غير مشروعة لشبكة الإنترنت دراسة مقارنة
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

الجرائم المستخدمة بطرق غير مشروعة لشبكة الإنترنت دراسة مقارنة

صالح, ألخيلي ، شمسان ناجي.

القاهرة : دار النهضة العربية ; 2009

Controlla posseduto()

2
الجرائم الناشئة عن الاستخدام غير المشروع لشبكة الإنترنت دراسة مقارنة
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

الجرائم الناشئة عن الاستخدام غير المشروع لشبكة الإنترنت دراسة مقارنة

عبيد, الكعبي ، محمد.

القاهرة : دار النهضة العربية ; 2009

Controlla posseduto()

3
Internet fraud casebook the World Wide Web of deceit
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

Internet fraud casebook the World Wide Web of deceit

Joseph T Wells

Hoboken, NJ : Wiley ; Chichester : John Wiley distributor ; 2010

Accesso online

4
2008 eCrime Researchers Summit
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

2008 eCrime Researchers Summit

Place of publication not identified I E E E ; 2008

Accesso online

5
Computer fraud casebook the bytes that bite
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

Computer fraud casebook the bytes that bite

Joseph T Wells

Hoboken, NJ : Wiley ; c2009

Accesso online

6
Material Type:
Rivista
Aggiungi allo Scaffale Elettronico

Computer fraud & security bulletin (Online)

Amsterdam ; New York : Elsevier Science ; -2007

Accesso online

7
Material Type:
Rivista
Aggiungi allo Scaffale Elettronico

International journal of cyber criminology.

India : publisher not identified ; 2007-

Accesso online

8
Computer forensics an essential guide for accountants, lawyers, and managers
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

Computer forensics an essential guide for accountants, lawyers, and managers

Michael. Sheetz

Hoboken, N.J. : John Wiley & Sons, Inc. ; c2007

Accesso online

9
Insider threat : a guide to understanding, detecting, and defending against the enemy from within
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

Insider threat : a guide to understanding, detecting, and defending against the enemy from within

Julie E. Mehan author.

Cambridgeshire, England : IT Governance Publishing ; 2016

Controlla posseduto()

10
Cybercrime : conceptualized and codified
Material Type:
Libro
Aggiungi allo Scaffale Elettronico

Cybercrime : conceptualized and codified

Kendrick S. Larson editor.; Hugh Williamson (Editor), editor.

New York : Nova Publishers ; 2013

Controlla posseduto()

Risutati 1 - 10 di 35.567  per Tutte le collezioni

Risultati 1 2 3 4 5 next page

Personalizza i tuoi risultati

  1. Edita

Refine Search Results

Espandi i miei risultati

  1.   

Mostra solo

  1. Riviste Peer-reviewed (2.994)
  2. Risorse online (35.516)

Argomento 

  1. Computer Crimes 
  2. Computer Crime 
  3. Computer Hackers 
  4. Data Security 
  5. Engineering 
  6. Internet 
  7. Computer Science 
  8. Computer Security 
  9. Software Industry 
  10. Malware 
  11. Security 
  12. Internet Security 
  13. Security Management 
  14. Computer networks 
  15. Crime 
  16. Law 
  17. Fraud 
  18. Computers 
  19. Network Security 
  20. Cyberterrorism 
  21. Terrorism 
  22. Hackers 
  23. Telecommunications Systems & Internet Communications 
  24. Internet Crime 
  25. Cybercrime 
  26. Data protection 
  27. Cyberspace 
  28. Data mining 
  29. Criminal Law 
  30. Business enterprises 
  31. Management 
  32. Crime prevention 
  33. Internet fraud 
  34. Management information systems 
  35. Public safety 
  36. Social media 
  37. Commercial crimes 
  38. Artificial intelligence 
  39. Corporations 
  40. Hacking 
  41. Sex crimes 
  42. Police 
  43. Organized crime 
  44. Human rights 
  45. Criminology 
  46. Electronic evidence 
  47. Information warfare 
  48. Systems and Data Security 
  49. Criminal procedure 
  50. Fraud investigation 
  51. Freedom of information 
  52. Computational Intelligence 
  53. Violence 
  54. Biometrics 
  55. Crime and Society 
  56. Policing 
  57. Social Sciences 
  58. Crime—Sociological aspects 
  59. Punishment 
  60. Computer Communication Networks 
  61. Mass media 
  62. Legal Aspects of Computing 
  63. Security Science and Technology 
  64. Computer Systems Organization and Communication Networks 
  65. Operating systems (Computers) 
  66. Transnational crime 
  67. Telecommunication 
  68. Evidence, Criminal 
  69. Cryptology 
  70. Critical criminology 
  71. Coding and Information Theory 
  72. Military and Defence Studies 
  73. Computer Appl. in Social and Behavioral Sciences 
  74. Crime and the Media 
  75. Politics and war 
  76. Sexual Behavior 
  77. Crime Control and Security 
  78. Data encryption (Computer science) 
  79. Violence and Crime 
  80. Prison and Punishment 
  81. Neurosciences 
  82. Mass media and crime 
  83. Business IT Infrastructure 
  84. Data Mining and Knowledge Discovery 
  85. Sexual Offending 
  86. Corrections 
  87. Juvenile delinquents 
  88. Security, International 
  89. International Security Studies 
  90. R & D/Technology Policy 
  91. Consciousness 
  92. System safety 
  93. Youth Offending and Juvenile Justice 
  94. Innovation/Technology Management 
  95. Law, Politics & Government 
  96. Internet governance 
  97. Criminal Law and Criminal Procedure Law 
  98. IT Law, Media Law, Intellectual Property 
  99. Media Sociology 
  100. Criminology, Penology & Juvenile Delinquency 
  101. Personality and Social Psychology 
  102. Law, General & Comparative 
  103. Computer network architectures 
  104. Mobile and Network Security 
  105. United States 
  106. Altre opzioni open sub menu

Autore 

  1. Anonymous 
  2. Messmer, Ellen 
  3. Greene, Tim 
  4. Browdie, Brian 
  5. Bw Online Bureau 
  6. Jackson, William 
  7. Kshetri, Nir 
  8. Berghel, Hal 
  9. Choo, Kim-Kwang Raymond 
  10. Shackelford, Scott J. 
  11. Tuttle, Hilary 
  12. Hutchings, Alice 
  13. Libicki, Martin C. 
  14. Lambrinoudakis, Costas 
  15. Levi, Michael 
  16. Clough, Jonathan 
  17. Wells, Joseph T 
  18. Owen, Tim 
  19. Lin, Herbert 
  20. Maimon, David 
  21. Cuppens, Frédéric 
  22. Powell, Anastasia 
  23. Schmitt, Michael N. 
  24. Ablon, Lillian 
  25. Hunton, Paul 
  26. Sammons, John 
  27. Henry, Nicola 
  28. Marshall, Eliot 
  29. Akhgar, Babak 
  30. Masys, Anthony J 
  31. Nicholson, Denise 
  32. Laykin, Erik 
  33. Antón, Annie 
  34. Senty, David 
  35. Institute of Electrical and Electronics Engineers 
  36. Kemshall, Hazel 
  37. Hooper, Christopher 
  38. Bourlai, Thirimachos 
  39. Kim, Hyoung Joong 
  40. Gritzalis, Dimitris 
  41. MacNamee, Brian 
  42. Iorliam, Aamo 
  43. Mason, Gail 
  44. Hämmerli, Bernhard M 
  45. Hurley, Neil 
  46. Katsikas, Sokratis K 
  47. Street, Jayson E. 
  48. Monte, Matthew 
  49. Antonucci, Domenic 
  50. McCartan, Kieran 
  51. Marcella, Albert J 
  52. Kalloniatis, Christos 
  53. Daly, Elizabeth 
  54. Berlingerio, Michele 
  55. Hull, Dave 
  56. Ulsch, N. MacDonnell 
  57. Kim, Gwangsu 
  58. Cuppens, Nora 
  59. Dube, Roger 
  60. Young, Garry 
  61. Saini, Dharmendra 
  62. Harrison, Richard M. 
  63. May, Tiggey 
  64. Schaefer, Dirk 
  65. Cusack, John 
  66. Kosal, Margaret E 
  67. صالح, ألخيلي ، شمسان ناجي 
  68. Xu, Songhua 
  69. Steinmetz, Kevin F. 
  70. Bliuc, Ana-Maria 
  71. APWG eCrime Researchers Summit 
  72. Harmon, Daniel E. 
  73. Institute of Management & Administration 
  74. Biasiotti, Maria Angela 
  75. Jaishankar, K. 
  76. Society of Digital Information and Wireless Communications 
  77. Williamson, Hugh 
  78. Prunckun, Henry 
  79. Denning, Dorothy Elizabeth Robling 
  80. De Sanctis, Fausto Martin 
  81. Bokhari, M. U 
  82. Leukfeldt, E. R 
  83. Macdonald, Stuart 
  84. Rascagnères, Joan Miquel 
  85. Bayerl, P. Saskia 
  86. Câerâe, Jean-Paul 
  87. Pym, David 
  88. Al-khateeb, Samer 
  89. Jahankhani, Hamid 
  90. Oboler, Andre 
  91. صادق, إسماعيل ، محمد 
  92. Schünemann, Wolf J 
  93. International Conference on Human Factors in Cybersecurity 
  94. Sampson, Fraser 
  95. Bahfen, Nasya 
  96. Taylor, Paul A. 
  97. Pfefferli, Peter W. 
  98. Agrawal, Namrata 
  99. Blair, John 
  100. Céré, Jean-Paul 
  101. Wood, Mark A 
  102. Club des directeurs de la sécurité des entreprises (France) 
  103. Karampelas, Panagiotis 
  104. Commonwealth Secretariat 
  105. Osinga, Frans P.B 
  106. Årnes, André 
  107. Bain, Andy 
  108. Chawki, Mohamed 
  109. Blaya, Catherine 
  110. Walker, Dori 
  111. Ranđelović, Dragan 
  112. Gori, Umberto 
  113. Connelly, Karen 
  114. Anti-Phishing Working Group 
  115. Quinlan, Henry M 
  116. Farrington, David P 
  117. Bhardwa, Bina 
  118. Karagiannopoulos, Vasileios 
  119. Altre opzioni open sub menu

Anno 

Da A
  1. Prima1979 
  2. 1979a1988 
  3. 1989a1998 
  4. 1999a2009 
  5. Dopo 2009 
  6. Altre opzioni open sub menu

Nuove Ricerche Suggerite

Ignora la mia strategia e cerca su tutto

da questo autore/creatore:

  1. Anonymous
  2. Messmer, Ellen
  3. Greene, Tim
  4. Browdie, Brian
  5. Bw Online Bureau

Ricerca in corso nelle risorse remote ...