|
|
1. |
|
Computer crime /
Publication:
Lexington, Mass. : Lexington Books, 1978
. xiii, 207 p. ;
Date:1978
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[HV6773 B46]
(1),
Actions:
Add to cart (remove)
|
|
|
2. |
|
computer insecurity /
Publication:
London : Chapman and Hall, 1983
. xiv, 351 p.
Date:1983
Availability:
Copies available:
Turkeyen Campus
Social Sciences
[HF5548.2 N67]
(1),
Actions:
Add to cart (remove)
|
|
|
3. |
|
Cybercrime and the law
by Brenner, Susan W.,
Publication:
Boston : Northeastern Univ Press, 2012
. 1 online resource (p.)
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
4. |
|
Policing Cyberspace
by Nhan, Johnny.
Publication:
El Paso : LFB Scholarly Pub. LLC, 2010
. 1 online resource (216 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
5. |
|
Risk factors in computer-crime victimization
by Choi, Kyung-shick,
Publication:
El Paso [Tex.] : LFB Scholarly Pub., 2010
. 1 online resource (vii, 167 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
6. |
|
Spring Security 3.1
by Winch, Robert.
Publication:
Birmingham : Packt Pub., 2012
. 1 online resource (950 p.)
, Configuring JdbcUserDetailsManager to use groups.
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
7. |
|
Surveillance or security?
by Landau, Susan Eva.
Publication:
Cambridge, Mass. : MIT Press, 2010
. 1 online resource (xvi, 383 p.) :
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
8. |
|
An introduction to hacking and crimeware
by Loewengart, Victoria.
Publication:
Ely, Cambridgeshire : IT Governance Pub., 2012
. 1 online resource (53 p.)
Date:2012
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
9. |
|
Data breaches
Publication:
Ely, U.K. : IT Governance Pub., 2008
. 1 online resource (120 p.) :
, Title from home page (viewed Jan. 4, 2011).
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
10. |
|
Electronic and mobile commerce law
Publication:
Hatfield, Hertfordshire : University of Hertfordshire Press, 2011
. 1 online resource (xxvii, 579 p.)
, Includes index.
Date:2011
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
11. |
|
Internet governance in an age of cyber insecurity
by Knake, Robert K.
Publication:
New York, NY : Council on Foreign Relations, 2010
. 1 online resource (x, 43 p.)
, "September 2010"
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
12. |
|
The investigator's guide to computer crime
by Franklin, Carl J.,
Publication:
Springfield, Ill. : Charles C. Thomas, 2006
. 1 online resource (xv, 312 p.) :
Date:2006
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
13. |
|
Policing cyber hate, cyber threats and cyber terrorism
Publication:
Farnham ; | Burlington, VT : Ashgate, 2011
. 1 online resource.
Date:2011
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
14. |
|
Spring security 3
by Mularien, Peter.
Publication:
Birmingham, U.K. : Packt Pub., 2010
. 1 online resource (x, 397 p.) :
, Includes index.
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
15. |
|
The virtual battlefield
Publication:
Amsterdam ; | Washington, DC : Ios Press, 2009
. 1 online resource (xx, 305 pages) :
Date:2009
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
16. |
|
Computer crime, investigation, and the law
by Easttom, Chuck.
Publication:
Boston, Mass. : Course Technology PTR/Cengage Learning, 2011
. 1 online resource (xvii, 499 p.) :
, Title from title screen.
Date:2011
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
17. |
|
Cyber-crime
Publication:
Hong Kong : Hong Kong University Press, 2005
. 1 online resource (xxvi, 434 p.)
Date:2005
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
18. |
|
CyberWar, CyberTerror, CyberCrime.
by Mehan, Julie E.
Publication:
Ely : IT Governance Pub., 2008
. 1 online resource (281 p.)
Date:2008
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
19. |
|
Managing Information Security Breaches
by Krausz, Michael.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (184 p.)
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|
|
20. |
|
Computer forensics
by Clarke, Nathan.
Publication:
Ely : IT Governance Pub., 2010
. 1 online resource (75 p.) :
Date:2010
Availability:
No items available:
Actions:
Add to cart (remove)
|
|