Résultats de la recherche - cyborg~
Dewey Classification dans votre recherche.
Dewey Classification dans votre recherche.
Suggestion de sujets dans votre recherche.
Suggestion de sujets dans votre recherche.
- Cyber law 4
- Computer networks 3
- Business logistics 2
- Computer crimes 2
- Computer networks Law and legislation 2
- Information technology 2
- Internet 2
- Organization 2
- Archival materials Conservation and restoration 1
- Automatic control 1
- Broadcasting laws 1
- Cloud computing Law and legislation 1
- Computer crimes India Prevention 1
- Computer crimes Prevention 1
- Computer networks--Law and legislation 1
- Computer security 1
- Corporation law 1
- Cyber Law 1
- Cyber crimes 1
- Cyber terrorism 1
- Data transmission systems--Law and legislation 1
- Diplomacy 1
- Education 1
- Electronic commerce 1
- Electronic commerce Law and legislation 1
- Electronic commerce--Law and legislation 1
- Electronic data processing India 1
- English philology 1
- Environmental planning 1
- Financial institutions 1
-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
The legal environment of business : text and cases ethical, regulatory, global and corporate issues /
Publié 2011Sujets:Livre -
10
-
11
-
12
Protection of human dignity in the context of cyber warfare: the status quo of international law regulating the use of force
Publié 2024Sujets: “…cyber welfare…”
Accéder au texte intégral
Accéder au texte intégral
Article -
13
Protection of human dignity in the context of cyber warfare: the status quo of international law regulating the use of force
Publié 2024Sujets: “…cyber welfare…”
Accéder au texte intégral
Accéder au texte intégral
Article -
14
-
15
-
16
-
17
-
18
Teaching in the age of covid-19:1 year later testmonials
Publié 2024Accéder au texte intégral
Article -
19
Teaching in the age of covid-19:1 year later testmonials
Publié 2024Accéder au texte intégral
Article -
20
Computer security fundamentals /
Publié 2012Table des matières: “…Introduction to computer security Networks and the internet Cyber stalking, fraud, and abuse Denial of service attacks Malware Techniques used by hackers Industrial espionage in cyberspace Encryption Computer security software Security policies Network scanning and vulnerability scanning Cyber terrorism and information warfare Cyber detective Introduction to forensics…”
Livre