Результаты поиска - cyborg~
Dewey Classification внутри своего поиска.
Dewey Classification внутри своего поиска.
Предлагаемые темы внутри своего поиска.
Предлагаемые темы внутри своего поиска.
- Cyber law 4
- Computer networks 3
- Business logistics 2
- Computer crimes 2
- Computer networks Law and legislation 2
- Information technology 2
- Internet 2
- Organization 2
- Archival materials Conservation and restoration 1
- Automatic control 1
- Broadcasting laws 1
- Cloud computing Law and legislation 1
- Computer crimes India Prevention 1
- Computer crimes Prevention 1
- Computer networks--Law and legislation 1
- Computer security 1
- Corporation law 1
- Cyber Law 1
- Cyber crimes 1
- Cyber terrorism 1
- Data transmission systems--Law and legislation 1
- Diplomacy 1
- Education 1
- Electronic commerce 1
- Electronic commerce Law and legislation 1
- Electronic commerce--Law and legislation 1
- Electronic data processing India 1
- English philology 1
- Environmental planning 1
- Financial institutions 1
-
1
An introduction to cyber crime and cyber law /
Опубликовано 2009“...Cyber crime and cyber law...”
-
2
Cyber law : Indian and International perspectives
Опубликовано 2012Предметы: “...Cyber terrorism...”
-
3
-
4
-
5
-
6
-
7
-
8
-
9
The legal environment of business : text and cases ethical, regulatory, global and corporate issues /
Опубликовано 2011Предметы: -
10
-
11
-
12
Protection of human dignity in the context of cyber warfare: the status quo of international law regulating the use of force
Опубликовано 2024Предметы: “...cyber welfare...”
Полный текст
Полный текст
Статья -
13
Protection of human dignity in the context of cyber warfare: the status quo of international law regulating the use of force
Опубликовано 2024Предметы: “...cyber welfare...”
Полный текст
Полный текст
Статья -
14
-
15
-
16
-
17
-
18
-
19
-
20
Computer security fundamentals /
Опубликовано 2012Оглавление: “...Introduction to computer security Networks and the internet Cyber stalking, fraud, and abuse Denial of service attacks Malware Techniques used by hackers Industrial espionage in cyberspace Encryption Computer security software Security policies Network scanning and vulnerability scanning Cyber terrorism and information warfare Cyber detective Introduction to forensics...”