Books on the topic 'Computer crimes Computer crimes Computer networks'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer crimes Computer crimes Computer networks.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Computer forensics: Computer crime scene investigation. 2nd ed. Charles River Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Diane, Barrett, and Broom Neil, eds. Computer forensics jumpstart. SYBEX, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

author, Rudolph K., Tittel Ed author, Broom Neil author, and Barrett Diane author, eds. Computer forensics jumpstart. Wiley Publishing, Inc., 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Branigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Casey, Eoghan. Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Digital evidence and computer crime: Forensic science, computers, and the Internet. 2nd ed. Academic Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Denning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Denning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kizza, Joseph Migga. Computer network security and cyber ethics. 3rd ed. McFarland, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

David, Cowen, and Davis Chris (Christopher Michael), eds. Hacking exposed computer forensics. 2nd ed. McGraw-Hill/Osborne, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Computer-mediated communication across cultures: International interactions in online environments. Information Science Reference, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Widodo. Sistem pemidanaan dalam cyber crime. Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Widodo. Sistem pemidanaan dalam cyber crime. Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Widodo. Sistem pemidanaan dalam cyber crime. Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Widodo. Sistem pemidanaan dalam cyber crime. Laksbang Mediatama, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Network security attacks and countermeasures. Information Science Reference, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Loundy, David J. Computer crime, information warfare, and economic espionage. Carolina Academic Press, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law. Computer viruses: Hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, first session, on the impact of computer viruses and other forms of computer sabotage or exploitation on computer information systems and networks, May 15, 1989. U.S. G.P.O., 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Richard, Bejtlich, and Rose Curtis W, eds. Real digital forensics: Computer security and incident response. Addison-Wesley, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

USAF Institute for National Security Studies., ed. Cyberterrorism and computer crimes: Issues surrounding the establishment of an international regime. USAF Institute for National Security Studies, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Bajpai, G. S. On cyber crime & cyber law. Serials Publications, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Bunting, Steve. EnCase Computer Forensics. John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Brenner, Susan W. Cybercrime: Criminal threats from cyberspace. Praeger, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Indonesia. Badan Pembinaan Hukum Nasional., ed. Pengkajian hukum tentang penyalahgunaan teknologi siber dalam gerakan teroris. Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Indonesia. Badan Pembinaan Hukum Nasional, ed. EU Convention on Cybercrime dikaitkan dengan upaya regulasi tindak pidana teknologi informasi. Badan Pembinaan Hukum Nasional, Kementerian Hukum dan Hak Asasi Manusia RI, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

Brenner, Susan W. Cybercrime: Criminal threats from cyberspace. Praeger, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Rao, S. V. Joga. Law of cyber crimes & information technology law: Policy, law & practice alongwith the text of select global legislations focusing on cyber crimes, etc. etc. Wadhwa and Co., 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chaubey, R. K. An introduction to cyber crime and cyber law. Kamal Law House, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gong gong xin xi wang luo an quan zhan lüe: Gonggong xinxi wangluo an uan zhanlue. Hubei ke xue ji shu chu ban she, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

Cisco router and switch forensics: Investigating and analyzing malicious network activity. Syngress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Liu, Dale. Cisco router and switch forensics: Investigating and analyzing malicious network activity. Syngress, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

SNS hwan'gyŏng esŏŭi pŏmjoe hyŏnsang kwa hyŏngsa chŏngch'aekchŏk taeŭng e kwanhan yŏn'gu: Cybercrime in social networking services and criminal justice responses. Han'guk Hyŏngsa Chŏngch'aek Yŏn'guwŏn, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Workshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Steve, Bunting, ed. Mastering Windows network forensics and investigation. Wiley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Street, Jayson E. Dissecting the hack: The forb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

Street, Jayson E. Dissecting the hack: The forb1dd3n network. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Lenny, Zeltser, ed. Malware: Fighting malicious code. Prentice Hall/PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Germany's security: Cyber crime and cyber war. Edition Octopus, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Supanto. Criminal policy: Memberantas pembajakan program komputer. Kerja Sama Lembaga Pengembangan Pendidikan (LPP) dan UPT Penerbitan dan Pencetakan UNS (UNS Press), Universitas Sebelas Maret Surakarta, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gong tong fan zui de wang luo yi hua yan jiu: Gongtong fanzui de wangluo yihua yanjiu. Zhongguo fang zheng chu ban she, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Sjahdeini, Sutan Remy. Kejahatan & tindak pidana komputer. Grafiti, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

Widodo. Memerangi cybercrime: Karakteristik, motivasi, dan strategi penanganannya dalam perspektif kriminologi. Aswaja Pressindo, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

Online security. ReferencePoint Press, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

1956-, Yu Chong-hyŏn, та Kang Chang-muk 1972-, ред. Netʻijŭn ŭl wihan e-hŏnpŏp: Cyber law. Kʻŏmyunikʻeisyŏn Buksŭ, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Dübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

Indira, Carr, ed. Computer crime. Ashgate, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Vacca, John R. Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series). 2nd ed. Charles River Media, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!