Resultados de búsqueda - cyborg~
Dewey Classification dentro de su búsqueda.
Dewey Classification dentro de su búsqueda.
Materias dentro de su búsqueda.
Materias dentro de su búsqueda.
- Cyber law 4
- Computer networks 3
- Business logistics 2
- Computer crimes 2
- Computer networks Law and legislation 2
- Information technology 2
- Internet 2
- Organization 2
- Archival materials Conservation and restoration 1
- Automatic control 1
- Broadcasting laws 1
- Cloud computing Law and legislation 1
- Computer crimes India Prevention 1
- Computer crimes Prevention 1
- Computer networks--Law and legislation 1
- Computer security 1
- Corporation law 1
- Cyber Law 1
- Cyber crimes 1
- Cyber terrorism 1
- Data transmission systems--Law and legislation 1
- Diplomacy 1
- Education 1
- Electronic commerce 1
- Electronic commerce Law and legislation 1
- Electronic commerce--Law and legislation 1
- Electronic data processing India 1
- English philology 1
- Environmental planning 1
- Financial institutions 1
-
1
-
2
Cyber law : Indian and International perspectives
Publicado 2012Materias: “…Cyber terrorism…”
Libro -
3
-
4
-
5
-
6
-
7
-
8
-
9
The legal environment of business : text and cases ethical, regulatory, global and corporate issues /
Publicado 2011Materias:Libro -
10
-
11
-
12
Protection of human dignity in the context of cyber warfare: the status quo of international law regulating the use of force
Publicado 2024Materias: “…cyber welfare…”
Enlace del recurso
Enlace del recurso
Artículo -
13
Protection of human dignity in the context of cyber warfare: the status quo of international law regulating the use of force
Publicado 2024Materias: “…cyber welfare…”
Enlace del recurso
Enlace del recurso
Artículo -
14
-
15
-
16
Issues of organizational design : a mathematical programming view of organizations /
Publicado 1981Libro -
17
Issues of organizational design : a mathematical programming view of organizations /
Publicado 1981Libro -
18
-
19
-
20
Computer security fundamentals /
Publicado 2012Tabla de Contenidos: “…Introduction to computer security Networks and the internet Cyber stalking, fraud, and abuse Denial of service attacks Malware Techniques used by hackers Industrial espionage in cyberspace Encryption Computer security software Security policies Network scanning and vulnerability scanning Cyber terrorism and information warfare Cyber detective Introduction to forensics…”
Libro