Fighting computer crime : a new framework for protecting information /
"A top computer crime expert explains why current computer security methods fall dangerously short of the mark and what we can do to fix them. Based on his 30 years as a cybercrime fighter, during which he interviewed more than 200 perpetrators and their victims, Donn B. Parker provides valuabl...
Na minha lista:
| Autor principal: | Parker, Donn B. |
|---|---|
| Formato: | Livro |
| Publicado em: |
New York :
Wiley ,
c1998.
|
| Assuntos: | |
| Acesso em linha: | http://www.loc.gov/catdir/description/wiley033/98028151.html |
| Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Computer crimes and digital investigations /
Por: Walden, Ian
Publicado em: (2007)
Por: Walden, Ian
Publicado em: (2007)
Cyber law : Indian & international perspectives on key topics including data security, E-commerce, cloid computing and cyber crimes /
Por: Viswanathan, Aparna
Publicado em: (2012)
Por: Viswanathan, Aparna
Publicado em: (2012)
Risky business : protect your business from being stalked, conned, or blackmailed on the Web /
Por: Janal, Daniel S.
Publicado em: (1998)
Por: Janal, Daniel S.
Publicado em: (1998)
Crime and deviance: an introduction to criminology
Por: Mushanga, Tibamanya Mwene
Publicado em: (1976)
Por: Mushanga, Tibamanya Mwene
Publicado em: (1976)
Computer law
Publicado em: (2002)
Publicado em: (2002)
An introduction to cyber crime and cyber law /
Por: Chaubey, R. K.
Publicado em: (2009)
Por: Chaubey, R. K.
Publicado em: (2009)
Forensic -ICT
Por: Kelmen,Danies
Publicado em: (2011)
Por: Kelmen,Danies
Publicado em: (2011)
Anatomy of crime
Por: Rukwaru, Mutea
Publicado em: (2008)
Por: Rukwaru, Mutea
Publicado em: (2008)
Cyber crime and corporate liability
Por: Nagpal, Rohas
Publicado em: (2008)
Por: Nagpal, Rohas
Publicado em: (2008)
Scientific techniques in criminal investigation
Por: Bridges, C.B
Publicado em: (2016)
Por: Bridges, C.B
Publicado em: (2016)
The local governance of crime : appeals to community and partnerships /
Por: Crawford, Adam
Publicado em: (1999)
Por: Crawford, Adam
Publicado em: (1999)
Criminology and penology
Por: Ponnaian, M.
Publicado em: (1992)
Por: Ponnaian, M.
Publicado em: (1992)
Forensic - ICT /
Por: Kelmen, Davies
Publicado em: (2011)
Por: Kelmen, Davies
Publicado em: (2011)
Multilateral treaty framework : an invitation to universal participation : focus 2003 : treaties against transnational organized crime and terrorism = traits multilateraux : pour une participation universelle : theme 2003 : traittes relatifs a la criminalite transnationale organisee et le terrorisme
Publicado em: (2003)
Publicado em: (2003)
Alternative policing styles : cross-cultural perspectives /
Publicado em: (1993)
Publicado em: (1993)
Computer security fundamentals /
Por: Easttom, Chuck
Publicado em: (2012)
Por: Easttom, Chuck
Publicado em: (2012)
Computers, ethics & social values /
Publicado em: (1995)
Publicado em: (1995)
Computer security : concepts, issues and implementation
Por: Basta Alfred
Publicado em: (2007)
Por: Basta Alfred
Publicado em: (2007)
Man missing
Por: Eberhart, Mignon G.
Publicado em: (1992)
Por: Eberhart, Mignon G.
Publicado em: (1992)
Forensic science in crime investigation
Por: Nabar, B. S.
Publicado em: (2005)
Por: Nabar, B. S.
Publicado em: (2005)
Principles of criminal law with model questions and suggested readings
Por: Srivastava, Prakash
Publicado em: (1980)
Por: Srivastava, Prakash
Publicado em: (1980)
Criminology : the core /
Por: Siegel, Larry J.
Publicado em: (2011)
Por: Siegel, Larry J.
Publicado em: (2011)
Information technology law /
Por: Lloyd, Ian J.
Publicado em: (2017)
Por: Lloyd, Ian J.
Publicado em: (2017)
Information technology law /
Por: Lloyd, Ian J.
Publicado em: (2008)
Por: Lloyd, Ian J.
Publicado em: (2008)
Information technology law /
Por: Lloyd, Ian J.
Publicado em: (2008)
Por: Lloyd, Ian J.
Publicado em: (2008)
Principles of information security
Por: Whitman Michael E.
Publicado em: (2012)
Por: Whitman Michael E.
Publicado em: (2012)
Federal white collar crime : cases and materials /
Por: O'Sullivan, Julie R.
Publicado em: (2007)
Por: O'Sullivan, Julie R.
Publicado em: (2007)
Professional criminals /
Publicado em: (1995)
Publicado em: (1995)
Protection and security on the information superhighway
Por: Cohen Frederick
Publicado em: (1995)
Por: Cohen Frederick
Publicado em: (1995)
The computer triangle /
Por: Oakman, Robert L.
Publicado em: (1997)
Por: Oakman, Robert L.
Publicado em: (1997)
Computer education
Por: Selvam, S. K. Parnneer
Publicado em: (2012)
Por: Selvam, S. K. Parnneer
Publicado em: (2012)
Law of crimes : exhaustive commentary on Indian Penal Code, 1860 (Act No. 45 of 1860) /
Por: Basu, N.D
Publicado em: (2006)
Por: Basu, N.D
Publicado em: (2006)
Law of crimes : exhaustive commentary on Indian Penal Code, 1860 (Act No. 45 of 1860) /
Por: Basu, N.D
Publicado em: (2006)
Por: Basu, N.D
Publicado em: (2006)
Criminology: problems and perspectives
Por: Siddique, Ahmad
Publicado em: (1997)
Por: Siddique, Ahmad
Publicado em: (1997)
Peter Norton's computing fundamentals
Por: Norton, Peter
Publicado em: (2003)
Por: Norton, Peter
Publicado em: (2003)
Peter Norton's computing fundamentals
Por: Norton, Peter
Publicado em: (2003)
Por: Norton, Peter
Publicado em: (2003)
Community policing and crime reduction: A case study at Korogwe district, Tanga,
Por: Hassani, Haruna M
Publicado em: (2024)
Por: Hassani, Haruna M
Publicado em: (2024)
Community policing and crime reduction: A case study at Korogwe district, Tanga,
Por: Hassani, Haruna M
Publicado em: (2024)
Por: Hassani, Haruna M
Publicado em: (2024)
Computer systems and networks
Publicado em: (2007)
Publicado em: (2007)
Fundamentals of computers
Por: Rajaraman V.
Publicado em: (2004)
Por: Rajaraman V.
Publicado em: (2004)
Registos relacionados
-
Computer crimes and digital investigations /
Por: Walden, Ian
Publicado em: (2007) -
Cyber law : Indian & international perspectives on key topics including data security, E-commerce, cloid computing and cyber crimes /
Por: Viswanathan, Aparna
Publicado em: (2012) -
Risky business : protect your business from being stalked, conned, or blackmailed on the Web /
Por: Janal, Daniel S.
Publicado em: (1998) -
Crime and deviance: an introduction to criminology
Por: Mushanga, Tibamanya Mwene
Publicado em: (1976) -
Computer law
Publicado em: (2002)