Resultados de búsqueda - cyborg~

Limitar resultados
  1. 1

    An introduction to cyber crime and cyber law / por Chaubey, R. K.

    Publicado 2009
    “…Cyber crime and cyber law…”
    Libro
  2. 2

    Cyber law : Indian and International perspectives por Viswanathan Aparna

    Publicado 2012
    Materias: “…Cyber terrorism…”
    Libro
  3. 3
  4. 4

    Text on cyber Law / por Duggal, Pavan

    Publicado 2016
    Materias: “…Cyber Law.…”
    Libro
  5. 5

    Textbook on Cyber law por Duggal,Pavan

    Publicado 2016
    Materias: “…Cyber law…”
    Libro
  6. 6

    Cyber law and crime por Barkha

    Publicado 2006
    Materias: “…Cyber law…”
    Libro
  7. 7

    Cyber crime and corporate liability por Nagpal, Rohas

    Publicado 2008
    Materias:
    Libro
  8. 8

    ICT law book por Mambi,Adam J.

    Publicado 2010
    Materias:
    Libro
  9. 9

    The legal environment of business : text and cases ethical, regulatory, global and corporate issues / por Cross, Frank B.

    Publicado 2011
    Materias:
    Libro
  10. 10

    Information technology: law and practice: law & emerging technology, cyber law & e-commerce por Sharma, Vakul

    Publicado 2007
    Libro
  11. 11

    Information technology : law and practice : law & emerging technology, cyber law & e-commerce por Sharma, Vakul

    Publicado 2007
    Libro
  12. 12
  13. 13
  14. 14

    Educational research : an introduction / por Gall, Meredith D.

    Publicado 2007
    Enlace del recurso
    Libro
  15. 15
  16. 16

    Issues of organizational design : a mathematical programming view of organizations / por Obel, Børge

    Publicado 1981
    Libro
  17. 17

    Issues of organizational design : a mathematical programming view of organizations / por Obel, Børge

    Publicado 1981
    Libro
  18. 18
  19. 19
  20. 20

    Computer security fundamentals / por Easttom, Chuck

    Publicado 2012
    Tabla de Contenidos: “…Introduction to computer security Networks and the internet Cyber stalking, fraud, and abuse Denial of service attacks Malware Techniques used by hackers Industrial espionage in cyberspace Encryption Computer security software Security policies Network scanning and vulnerability scanning Cyber terrorism and information warfare Cyber detective Introduction to forensics…”
    Libro