Books on the topic 'Computer crimes Computer crimes Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer crimes Computer crimes Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Vacca, John R. Computer forensics: Computer crime scene investigation. 3rd ed. Jones and Bartlett Publishers, 2010.
Find full textComputer forensics: Computer crime scene investigation. 2nd ed. Charles River Media, 2005.
Find full textauthor, Rudolph K., Tittel Ed author, Broom Neil author, and Barrett Diane author, eds. Computer forensics jumpstart. Wiley Publishing, Inc., 2011.
Find full textBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.
Find full textHigh-tech crimes revealed: Cyberwar stories from the digital front. Addison-Wesley, 2005.
Find full textCasey, Eoghan. Digital evidence and computer crime: Forensic science, computers and the Internet. Academic, 2000.
Find full textDigital evidence and computer crime: Forensic science, computers and the Internet. Academic, 1999.
Find full textDigital evidence and computer crime: Forensic science, computers, and the Internet. 2nd ed. Academic Press, 2004.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1989.
Find full textDenning, Peter J. Threats and countermeasures for network security. Research Institute for Advanced Computer Science, NASA Ames Research Center, 1991.
Find full textKizza, Joseph Migga. Computer network security and cyber ethics. 3rd ed. McFarland, 2011.
Find full textDavid, Cowen, and Davis Chris (Christopher Michael), eds. Hacking exposed computer forensics. 2nd ed. McGraw-Hill/Osborne, 2010.
Find full textComputer-mediated communication across cultures: International interactions in online environments. Information Science Reference, 2011.
Find full textNetwork security attacks and countermeasures. Information Science Reference, 2015.
Find full textLoundy, David J. Computer crime, information warfare, and economic espionage. Carolina Academic Press, 2003.
Find full textUnited States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology and the Law. Computer viruses: Hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Congress, first session, on the impact of computer viruses and other forms of computer sabotage or exploitation on computer information systems and networks, May 15, 1989. U.S. G.P.O., 1991.
Find full textRichard, Bejtlich, and Rose Curtis W, eds. Real digital forensics: Computer security and incident response. Addison-Wesley, 2005.
Find full textUSAF Institute for National Security Studies., ed. Cyberterrorism and computer crimes: Issues surrounding the establishment of an international regime. USAF Institute for National Security Studies, 2000.
Find full textIndonesia. Badan Pembinaan Hukum Nasional., ed. Pengkajian hukum tentang penyalahgunaan teknologi siber dalam gerakan teroris. Badan Pembinaan Hukum Nasional, Departemen Hukum dan Hak Asasi Manusia RI, 2008.
Find full textIndonesia. Badan Pembinaan Hukum Nasional, ed. EU Convention on Cybercrime dikaitkan dengan upaya regulasi tindak pidana teknologi informasi. Badan Pembinaan Hukum Nasional, Kementerian Hukum dan Hak Asasi Manusia RI, 2011.
Find full textRao, S. V. Joga. Law of cyber crimes & information technology law: Policy, law & practice alongwith the text of select global legislations focusing on cyber crimes, etc. etc. Wadhwa and Co., 2004.
Find full textChaubey, R. K. An introduction to cyber crime and cyber law. Kamal Law House, 2009.
Find full textGong gong xin xi wang luo an quan zhan lüe: Gonggong xinxi wangluo an uan zhanlue. Hubei ke xue ji shu chu ban she, 2002.
Find full textCisco router and switch forensics: Investigating and analyzing malicious network activity. Syngress, 2009.
Find full textLiu, Dale. Cisco router and switch forensics: Investigating and analyzing malicious network activity. Syngress, 2009.
Find full textSNS hwan'gyŏng esŏŭi pŏmjoe hyŏnsang kwa hyŏngsa chŏngch'aekchŏk taeŭng e kwanhan yŏn'gu: Cybercrime in social networking services and criminal justice responses. Han'guk Hyŏngsa Chŏngch'aek Yŏn'guwŏn, 2014.
Find full textWorkshop on Insider Attack and Cyber Security (1st : 2007 : Washington, D.C.), ed. Insider attack and cyber security: Beyond the hacker. Springer, 2008.
Find full textSteve, Bunting, ed. Mastering Windows network forensics and investigation. Wiley, 2007.
Find full textSupanto. Criminal policy: Memberantas pembajakan program komputer. Kerja Sama Lembaga Pengembangan Pendidikan (LPP) dan UPT Penerbitan dan Pencetakan UNS (UNS Press), Universitas Sebelas Maret Surakarta, 2011.
Find full textGong tong fan zui de wang luo yi hua yan jiu: Gongtong fanzui de wangluo yihua yanjiu. Zhongguo fang zheng chu ban she, 2010.
Find full textWidodo. Memerangi cybercrime: Karakteristik, motivasi, dan strategi penanganannya dalam perspektif kriminologi. Aswaja Pressindo, 2013.
Find full text1956-, Yu Chong-hyŏn, та Kang Chang-muk 1972-, ред. Netʻijŭn ŭl wihan e-hŏnpŏp: Cyber law. Kʻŏmyunikʻeisyŏn Buksŭ, 2006.
Find full textDübendorfer, Thomas P. Impact analysis, early detection, and mitigation of large-scale Internet attacks. Shaker, 2005.
Find full textVacca, John R. Computer Forensics: Computer Crime Scene Investigation (Networking Series) (Networking Series). 2nd ed. Charles River Media, 2005.
Find full text