1 2 3 Next >>
1. Computer crime /   Publication: Lexington, Mass. : Lexington Books, 1978 . xiii, 207 p. ; Date:1978 Availability: Copies available: Turkeyen Campus Social Sciences [HV6773 B46] (1), Actions: Add to cart
2. computer insecurity /   Publication: London : Chapman and Hall, 1983 . xiv, 351 p. Date:1983 Availability: Copies available: Turkeyen Campus Social Sciences [HF5548.2 N67] (1), Actions: Add to cart
3. Cybercrime and the law by Brenner, Susan W., Publication: Boston : Northeastern Univ Press, 2012 . 1 online resource (p.) Date:2012 Availability: No items available: Actions: Add to cart
4. Policing Cyberspace by Nhan, Johnny. Publication: El Paso : LFB Scholarly Pub. LLC, 2010 . 1 online resource (216 p.) Date:2010 Availability: No items available: Actions: Add to cart
5. Risk factors in computer-crime victimization by Choi, Kyung-shick, Publication: El Paso [Tex.] : LFB Scholarly Pub., 2010 . 1 online resource (vii, 167 p.) Date:2010 Availability: No items available: Actions: Add to cart
6. Spring Security 3.1 by Winch, Robert. Publication: Birmingham : Packt Pub., 2012 . 1 online resource (950 p.) , Configuring JdbcUserDetailsManager to use groups. Date:2012 Availability: No items available: Actions: Add to cart
7. Surveillance or security? by Landau, Susan Eva. Publication: Cambridge, Mass. : MIT Press, 2010 . 1 online resource (xvi, 383 p.) : Date:2010 Availability: No items available: Actions: Add to cart
8. An introduction to hacking and crimeware by Loewengart, Victoria. Publication: Ely, Cambridgeshire : IT Governance Pub., 2012 . 1 online resource (53 p.) Date:2012 Availability: No items available: Actions: Add to cart
9. Data breaches   Publication: Ely, U.K. : IT Governance Pub., 2008 . 1 online resource (120 p.) : , Title from home page (viewed Jan. 4, 2011). Date:2008 Availability: No items available: Actions: Add to cart
10. Electronic and mobile commerce law   Publication: Hatfield, Hertfordshire : University of Hertfordshire Press, 2011 . 1 online resource (xxvii, 579 p.) , Includes index. Date:2011 Availability: No items available: Actions: Add to cart
11. Internet governance in an age of cyber insecurity by Knake, Robert K. Publication: New York, NY : Council on Foreign Relations, 2010 . 1 online resource (x, 43 p.) , "September 2010" Date:2010 Availability: No items available: Actions: Add to cart
12. The investigator's guide to computer crime by Franklin, Carl J., Publication: Springfield, Ill. : Charles C. Thomas, 2006 . 1 online resource (xv, 312 p.) : Date:2006 Availability: No items available: Actions: Add to cart
13. Policing cyber hate, cyber threats and cyber terrorism   Publication: Farnham ; | Burlington, VT : Ashgate, 2011 . 1 online resource. Date:2011 Availability: No items available: Actions: Add to cart
14. Spring security 3 by Mularien, Peter. Publication: Birmingham, U.K. : Packt Pub., 2010 . 1 online resource (x, 397 p.) : , Includes index. Date:2010 Availability: No items available: Actions: Add to cart
15. The virtual battlefield   Publication: Amsterdam ; | Washington, DC : Ios Press, 2009 . 1 online resource (xx, 305 pages) : Date:2009 Availability: No items available: Actions: Add to cart
16. Computer crime, investigation, and the law by Easttom, Chuck. Publication: Boston, Mass. : Course Technology PTR/Cengage Learning, 2011 . 1 online resource (xvii, 499 p.) : , Title from title screen. Date:2011 Availability: No items available: Actions: Add to cart
17. Cyber-crime   Publication: Hong Kong : Hong Kong University Press, 2005 . 1 online resource (xxvi, 434 p.) Date:2005 Availability: No items available: Actions: Add to cart
18. CyberWar, CyberTerror, CyberCrime. by Mehan, Julie E. Publication: Ely : IT Governance Pub., 2008 . 1 online resource (281 p.) Date:2008 Availability: No items available: Actions: Add to cart
19. Managing Information Security Breaches by Krausz, Michael. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (184 p.) Date:2010 Availability: No items available: Actions: Add to cart
20. Computer forensics by Clarke, Nathan. Publication: Ely : IT Governance Pub., 2010 . 1 online resource (75 p.) : Date:2010 Availability: No items available: Actions: Add to cart
1 2 3 Next >>