Profiling hackers the science of criminal profiling as applied to the world of hacking
| Main Authors: | Chiesa, Raoul 1973- (Author), Ciappi, Silvio 1965- (Author), Ducci, Stefania (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
Auerbach Publications
c2009
|
| Subjects: | |
| Online Access: | Table of contents only |
Similar Items
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015)
by: Shahrin Sahib, et al.
Published: (2015)
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010)
by: Li, Chang-Tsun 1914-
Published: (2010)
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013)
by: Johnson, Mark 1959-
Published: (2013)
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998)
by: Janal, Daniel S.
Published: (1998)
Gray hat hacking the ethical hacker's handbook
by: Harper, Allen
Published: (2011)
by: Harper, Allen
Published: (2011)
Cybercrime and society
by: Yar, Majid
Published: (2006)
by: Yar, Majid
Published: (2006)
Computer misuse response, regulation and the law
by: Fafinski, Stefan
Published: (2009)
by: Fafinski, Stefan
Published: (2009)
The CERT guide to insider threats how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by: Cappelli, Dawn, et al.
Published: (2012)
by: Cappelli, Dawn, et al.
Published: (2012)
Criminal profiling an introduction to behavioral evidence analysis
by: Turvey, Brent E.
Published: (2012)
by: Turvey, Brent E.
Published: (2012)
Network security a hacker's perspective
by: Fadia, Ankit 1985-
Published: (2017)
by: Fadia, Ankit 1985-
Published: (2017)
Network security a hacker's perspective
by: Fadia, Ankit 1985-
Published: (2006)
by: Fadia, Ankit 1985-
Published: (2006)
Internet fraud casebook the World Wide Web of deceit
by: Wells, Joseph T.
Published: (2010)
by: Wells, Joseph T.
Published: (2010)
Steal this computer book 3 : what they won't tell you about the Internet
by: Wang, Wallace
Published: (2003)
by: Wang, Wallace
Published: (2003)
Hacker techniques, tools, and incident handling
by: Oriyano, Sean-Philip, et al.
by: Oriyano, Sean-Philip, et al.
الجرائم الدولية للانترنت
by: يوسف، يوسف حسن
Published: (2011)
by: يوسف، يوسف حسن
Published: (2011)
Handbook of digital and multimedia forensic evidence
by: Barbara, John J.
Published: (2008)
by: Barbara, John J.
Published: (2008)
How to define and build an effective cyber threat intelligence capability
by: Dalziel, Henry
Published: (2015)
by: Dalziel, Henry
Published: (2015)
Hacking for dummies
by: Beaver, Kevin
by: Beaver, Kevin
Legal framework affecting cybercrimes in Yemen with special reference to Malaysia
by: Mohammed, Ammar Abdullah Saeed
by: Mohammed, Ammar Abdullah Saeed
A machine learning approach to phishing detection and defense
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
by: Akanbi, Oluwatobi Ayodeji, et al.
Published: (2015)
Managerial guide for handling cyber-terrorism and information warfare
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
by: Janczewski, Lech , 1943-, et al.
Published: (2005)
The best of 2600 A hacker odyssey
by: Goldstein, Emmanuel 1959-
Published: (2008)
by: Goldstein, Emmanuel 1959-
Published: (2008)
Network forensics tracking hackers through cyberspace
by: Davidoff, Sherri, et al.
Published: (2012)
by: Davidoff, Sherri, et al.
Published: (2012)
Advanced penetration testing hacking the world's most secure networks
by: Allsopp, Wil
Published: (2017)
by: Allsopp, Wil
Published: (2017)
Hacking PhotoShop CS [electronic resource]
by: Singh, Shangara 1952-
Published: (2005)
by: Singh, Shangara 1952-
Published: (2005)
Social engineering the art of human hacking
by: Hadnagy, Christopher
Published: (2011)
by: Hadnagy, Christopher
Published: (2011)
Internet security hacking, counterhacking, and society
by: Himma, Kenneth Einar
Published: (2007)
by: Himma, Kenneth Einar
Published: (2007)
Cyberpunk outlaws hackers on the computer frontier
by: Hafner, Katie, et al.
Published: (1991)
by: Hafner, Katie, et al.
Published: (1991)
Juvenile deliquency and its origin an intergrated theoretical approach
by: Johnson, Richard E.
Published: (1979)
by: Johnson, Richard E.
Published: (1979)
Hacking exposed computer forensics
by: Philipp, Aaron, et al.
Published: (2010)
by: Philipp, Aaron, et al.
Published: (2010)
Coding freedom the ethics and aesthetics of hacking
by: Coleman, E. Gabriella 1973-
Published: (2013)
by: Coleman, E. Gabriella 1973-
Published: (2013)
Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks
by: Brancik, Kenneth C.
Published: (2008)
by: Brancik, Kenneth C.
Published: (2008)
Computer forensics and cyber crime an introduction
by: Britz, Marjie
Published: (2009)
by: Britz, Marjie
Published: (2009)
Hacking digital media and technological determinism
by: Jordan, Tim
Published: (2008)
by: Jordan, Tim
Published: (2008)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
Published: (2010)
by: Nelson, Bill, et al.
Published: (2010)
Guide to computer forensics and investigations
by: Nelson, Bill, et al.
by: Nelson, Bill, et al.
Guide to computer forensics and investigations
Published: (2008)
Published: (2008)
From juvenile delinquency to adult crime criminal careers, justice policy, and prevention
by: Farrington, David P., et al.
Published: (2012)
by: Farrington, David P., et al.
Published: (2012)
Kesedaran keselamatan siber 101 penganalisaan ancaman siber
by: Madihah Mohd Saudi
Published: (2015)
by: Madihah Mohd Saudi
Published: (2015)
Introduction to criminology a text/reader
by: Walsh, Anthony 1941-, et al.
Published: (2008)
by: Walsh, Anthony 1941-, et al.
Published: (2008)
Similar Items
-
Cyber terrorism policy and technical perspective
by: Shahrin Sahib, et al.
Published: (2015) -
Handbook of research on computational forensics, digital crime, and investigation methods and solutions
by: Li, Chang-Tsun 1914-
Published: (2010) -
Cyber crime, security and digital intelligence
by: Johnson, Mark 1959-
Published: (2013) -
Risky business protect your business from being stalked, conned, or blackmailed on the Web
by: Janal, Daniel S.
Published: (1998) -
Gray hat hacking the ethical hacker's handbook
by: Harper, Allen
Published: (2011)