Cybercrime and society
| Main Author: | Yar, Majid (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
London
Sage Publications
c2006
|
| Subjects: | |
| Online Access: | Table of contents |
Similar Items
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed
by: Mohammed, Ammar Abdullah Saeed
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)
by: يوسف، يوسف حسن
Published: (2011)
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Profiling hackers the science of criminal profiling as applied to the world of hacking
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
by: Chiesa, Raoul 1973-, et al.
Published: (2009)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)
by: Janal, Daniel S.
Published: (1998)
Managerial guide for handling cyber-terrorism and information warfare
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
Internet fraud casebook the World Wide Web of deceit
by: Wells, Joseph T.
Published: (2010)
by: Wells, Joseph T.
Published: (2010)
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
Scene of the cybercrime
by: Cross, Michael
Published: (2008)
by: Cross, Michael
Published: (2008)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Cegah jenayah pencegahan jenayah syariah
by: Zulkifli Mohamad al-Bakri 1969-
Published: (2014)
by: Zulkifli Mohamad al-Bakri 1969-
Published: (2014)
الجرائم الالكترونية في الشريعة الاسلامية والقوانين الوضعية بحث فقهى مقارن
by: منصور، الشحات ابراهيم محمد
Published: (2010)
by: منصور، الشحات ابراهيم محمد
Published: (2010)
الجرائم المعلوماتية في التشريع المقارن والشريعة الاسلامية
by: زين الدين، بلال أمين
Published: (2014)
by: زين الدين، بلال أمين
Published: (2014)
احكام جرائم المعلومات في الفقه الاسلامي والقانون
by: زيدي، طه احمد
Published: (2017)
by: زيدي، طه احمد
Published: (2017)
الارهاب وتشريعات المكافحة في الدول الديمقراطية
by: غنام, محمد ابو الفتح
Published: (1991)
by: غنام, محمد ابو الفتح
Published: (1991)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
Victims, crime and society
by: Davies, Pamela 1962-, et al.
Published: (2007)
by: Davies, Pamela 1962-, et al.
Published: (2007)
Crime prevention approaches, practices and evaluations
by: Lab, Steven P.
Published: (2016)
by: Lab, Steven P.
Published: (2016)
Crime in the future
by: Kanetkar, V. G.
Published: (1995)
by: Kanetkar, V. G.
Published: (1995)
العلوم المؤثرة في الجريمة والمجرم : علم الاجتماع الجنائين علم النفس الجنائي، علم النفس القضائي
by: سكيكر, محمد علي
Published: (2008)
by: سكيكر, محمد علي
Published: (2008)
Crime prevention a critical introduction
by: Evans, Karen 1961-
Published: (2011)
by: Evans, Karen 1961-
Published: (2011)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
The basics of digital forensics the primer for getting started in digital forensics
by: Sammons, John
Published: (2015)
by: Sammons, John
Published: (2015)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
جرائم اساءة استعمال السلطة الاقتصادية الاحتكار، الرفع التعسفي للاسعار، اساءة استخدام المركز الاحتكاري في السوق
by: منير، مصطفى
Published: (1992)
by: منير، مصطفى
Published: (1992)
Jenayah di Malaysia
by: Muhammad Reduan Hj. Aslie
Published: (1990)
by: Muhammad Reduan Hj. Aslie
Published: (1990)
Corporate and white-collar crime
by: Minkes, A. L., et al.
Published: (2008)
by: Minkes, A. L., et al.
Published: (2008)
Criminology review yearbook, vol. 1
by: Bittner, Egon , 1921-, et al.
Published: (1979)
by: Bittner, Egon , 1921-, et al.
Published: (1979)
Internet searches for vetting, investigations, and open-source intelligence
by: Appel, Edward J.
Published: (2011)
by: Appel, Edward J.
Published: (2011)
Genocide, state crime and the law : in the name of the state
by: Balint, Jennifer
Published: (2012)
by: Balint, Jennifer
Published: (2012)
Organised crime and the law a comparative analysis
by: Campbell, Liz
Published: (2013)
by: Campbell, Liz
Published: (2013)
Similar Items
-
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010) -
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009) -
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed -
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012) -
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)