Fighting computer crime : a new framework for protecting information /
"A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuabl...
Enregistré dans:
| Auteur principal: | Parker, Donn B. |
|---|---|
| Format: | Livre |
| Publié: |
New York :
Wiley ,
c1998.
|
| Sujets: | |
| Accès en ligne: | http://www.loc.gov/catdir/description/wiley033/98028151.html |
| Tags: |
Ajouter un tag
Pas de tags, Soyez le premier à ajouter un tag!
|
Documents similaires
Computer crimes and digital investigations /
par: Walden, Ian
Publié: (2007)
par: Walden, Ian
Publié: (2007)
Cyber law : Indian & international perspectives on key topics including data security, E-commerce, cloid computing and cyber crimes /
par: Viswanathan, Aparna
Publié: (2012)
par: Viswanathan, Aparna
Publié: (2012)
Risky business : protect your business from being stalked, conned, or blackmailed on the Web /
par: Janal, Daniel S.
Publié: (1998)
par: Janal, Daniel S.
Publié: (1998)
Crime and deviance: an introduction to criminology
par: Mushanga, Tibamanya Mwene
Publié: (1976)
par: Mushanga, Tibamanya Mwene
Publié: (1976)
Computer law
Publié: (2002)
Publié: (2002)
An introduction to cyber crime and cyber law /
par: Chaubey, R. K.
Publié: (2009)
par: Chaubey, R. K.
Publié: (2009)
Forensic -ICT
par: Kelmen,Danies
Publié: (2011)
par: Kelmen,Danies
Publié: (2011)
Anatomy of crime
par: Rukwaru, Mutea
Publié: (2008)
par: Rukwaru, Mutea
Publié: (2008)
Cyber crime and corporate liability
par: Nagpal, Rohas
Publié: (2008)
par: Nagpal, Rohas
Publié: (2008)
Scientific techniques in criminal investigation
par: Bridges, C.B
Publié: (2016)
par: Bridges, C.B
Publié: (2016)
The local governance of crime : appeals to community and partnerships /
par: Crawford, Adam
Publié: (1999)
par: Crawford, Adam
Publié: (1999)
Criminology and penology
par: Ponnaian, M.
Publié: (1992)
par: Ponnaian, M.
Publié: (1992)
Forensic - ICT /
par: Kelmen, Davies
Publié: (2011)
par: Kelmen, Davies
Publié: (2011)
Multilateral treaty framework : an invitation to universal participation : focus 2003 : treaties against transnational organized crime and terrorism = traits multilateraux : pour une participation universelle : theme 2003 : traittes relatifs a la criminalite transnationale organisee et le terrorisme
Publié: (2003)
Publié: (2003)
Alternative policing styles : cross-cultural perspectives /
Publié: (1993)
Publié: (1993)
Computer security fundamentals /
par: Easttom, Chuck
Publié: (2012)
par: Easttom, Chuck
Publié: (2012)
Computers, ethics & social values /
Publié: (1995)
Publié: (1995)
Computer security : concepts, issues and implementation
par: Basta Alfred
Publié: (2007)
par: Basta Alfred
Publié: (2007)
Man missing
par: Eberhart, Mignon G.
Publié: (1992)
par: Eberhart, Mignon G.
Publié: (1992)
Forensic science in crime investigation
par: Nabar, B. S.
Publié: (2005)
par: Nabar, B. S.
Publié: (2005)
Principles of criminal law with model questions and suggested readings
par: Srivastava, Prakash
Publié: (1980)
par: Srivastava, Prakash
Publié: (1980)
Criminology : the core /
par: Siegel, Larry J.
Publié: (2011)
par: Siegel, Larry J.
Publié: (2011)
Information technology law /
par: Lloyd, Ian J.
Publié: (2017)
par: Lloyd, Ian J.
Publié: (2017)
Information technology law /
par: Lloyd, Ian J.
Publié: (2008)
par: Lloyd, Ian J.
Publié: (2008)
Information technology law /
par: Lloyd, Ian J.
Publié: (2008)
par: Lloyd, Ian J.
Publié: (2008)
Principles of information security
par: Whitman Michael E.
Publié: (2012)
par: Whitman Michael E.
Publié: (2012)
Federal white collar crime : cases and materials /
par: O'Sullivan, Julie R.
Publié: (2007)
par: O'Sullivan, Julie R.
Publié: (2007)
Professional criminals /
Publié: (1995)
Publié: (1995)
Protection and security on the information superhighway
par: Cohen Frederick
Publié: (1995)
par: Cohen Frederick
Publié: (1995)
The computer triangle /
par: Oakman, Robert L.
Publié: (1997)
par: Oakman, Robert L.
Publié: (1997)
Computer education
par: Selvam, S. K. Parnneer
Publié: (2012)
par: Selvam, S. K. Parnneer
Publié: (2012)
Law of crimes : exhaustive commentary on Indian Penal Code, 1860 (Act No. 45 of 1860) /
par: Basu, N.D
Publié: (2006)
par: Basu, N.D
Publié: (2006)
Law of crimes : exhaustive commentary on Indian Penal Code, 1860 (Act No. 45 of 1860) /
par: Basu, N.D
Publié: (2006)
par: Basu, N.D
Publié: (2006)
Criminology: problems and perspectives
par: Siddique, Ahmad
Publié: (1997)
par: Siddique, Ahmad
Publié: (1997)
Peter Norton's computing fundamentals
par: Norton, Peter
Publié: (2003)
par: Norton, Peter
Publié: (2003)
Peter Norton's computing fundamentals
par: Norton, Peter
Publié: (2003)
par: Norton, Peter
Publié: (2003)
Community policing and crime reduction: A case study at Korogwe district, Tanga,
par: Hassani, Haruna M
Publié: (2024)
par: Hassani, Haruna M
Publié: (2024)
Community policing and crime reduction: A case study at Korogwe district, Tanga,
par: Hassani, Haruna M
Publié: (2024)
par: Hassani, Haruna M
Publié: (2024)
Computer systems and networks
Publié: (2007)
Publié: (2007)
Fundamentals of computers
par: Rajaraman V.
Publié: (2004)
par: Rajaraman V.
Publié: (2004)
Documents similaires
-
Computer crimes and digital investigations /
par: Walden, Ian
Publié: (2007) -
Cyber law : Indian & international perspectives on key topics including data security, E-commerce, cloid computing and cyber crimes /
par: Viswanathan, Aparna
Publié: (2012) -
Risky business : protect your business from being stalked, conned, or blackmailed on the Web /
par: Janal, Daniel S.
Publié: (1998) -
Crime and deviance: an introduction to criminology
par: Mushanga, Tibamanya Mwene
Publié: (1976) -
Computer law
Publié: (2002)