Books on the topic 'Criminalité informatique'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Criminalité informatique.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Rosé, Philippe. La criminalité informatique. Paris: Presses universitaires de France, 1988.
Find full textBurger, Ralf. Virus, la maladie des ordinateurs : de la protection du matériel à la protection juridique. Paris: Éditions Micro Application, 1989.
Find full textHébert, Monique. Les délits informatiques. Ottawa, Ont: Bibliothèque du Parlement, Service de recherche, 1991.
Find full textRmail, Bouchaïb. Criminalité informatique ou liée aux nouvelles technologies de l'information et de la communication. 2nd ed. [Casablanca?: s.n.], 2010.
Find full textBoni, William C. Netspionage: The global threat to information. Boston: Butterworth-Heinemann, 2000.
Find full textPaget, François. Vers & virus: Classification, lutte anti-virale et perspectives. Paris: Dunod, 2005.
Find full textLisa, Yount, ed. Does the Internet increase the risk of crime? San Diego, Calif: Greenhaven Press, 2006.
Find full textDaniel, Martin. La criminalité informatique. Paris: Presses universitaires de France, 1997.
Find full textChatelain, Yannick. Marketing et cybercriminalité. Paris: Hermes science publications, 2000.
Find full textSlatalla, Michelle. Masters of deception: The gang that ruled cyberspace. New York: HarperCollins Publishers, 1995.
Find full text1956-, Wall David, ed. Crime and deviance in cyberspace. Aldershot, Hants, England: Ashgate, 2009.
Find full textMichel, Racicot, and Canada Industrie Canada, eds. L' espace cybernétique n'est pas une terre sans loi: Étude des questions relatives à la responsabilité à l'égard du contenu circulant sur Internet. Ottawa, Ont: Industrie Canada, 1997.
Find full textJ, Marcella Albert, and Menendez Doug, eds. Cyber forensics: A field manual for collecting, examining, and preserving evidence of computer crimes. 2nd ed. New York: Auerbach Publications, 2008.
Find full textJ, Marcella Albert, and Menendez Doug, eds. Cyber forensics: A field manual for collecting, examining, and preserving evidence of computer crimes. 2nd ed. New York: Auerbach Publications, 2008.
Find full textJ, Marcella Albert, and Menendez Doug, eds. Cyber forensics: A field manual for collecting, examining, and preserving evidence of computer crimes. 2nd ed. New York: Auerbach Publications, 2008.
Find full textAlex, Hirschfield, and Bowers Kate 1972-, eds. Mapping and analysing crime data: Lessons from research and practice. New York: Taylor & Francis, 2001.
Find full textInstitut des hautes études de la sécurité intérieure., ed. La criminalité informatique à l'horizon 2005: Analyse prospective. Paris: L'Harmattan, 1992.
Find full textSteinmetz, Kevin F., and Matt R. Nobles. Technocrime and Criminological Theory. Taylor & Francis Group, 2017.
Find full textSteinmetz, Kevin F., and Matt R. Nobles. Technocrime and Criminological Theory. Taylor & Francis Group, 2017.
Find full textSteinmetz, Kevin F., and Matt R. Nobles. Technocrime and Criminological Theory. Taylor & Francis Group, 2017.
Find full textSteinmetz, Kevin F., and Matt R. Nobles. Technocrime and Criminological Theory. Taylor & Francis Group, 2017.
Find full textUpdegrove, Andrew. The Alexandria Project: A Tale of Deception and Elections. Starboard Rock Press, 2012.
Find full textThe Alexandria Project: A Tale of Treachery and Technology. Dog Ear Publishing, LLC, 2012.
Find full textGlenny, Misha. DarkMarket: Cyberthieves, Cybercops and You. Penguin Random House, 2011.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Find full textBrancik, Kenneth. Insider Computer Fraud: An in-Depth Framework for Detecting and Defending Against Insider IT Attacks. Auerbach Publishers, Incorporated, 2007.
Find full textInsider Computer Fraud: An In-depth Framework for Detecting and Defending against Insider IT Attacks. AUERBACH, 2007.
Find full textIslam, Rafiqul, and Erdal Ozkaya. Inside the Dark Web. Taylor & Francis Group, 2019.
Find full textIslam, Rafiqul, and Erdal Ozkaya. Inside the Dark Web. Taylor & Francis Group, 2019.
Find full textSavona, Ernesto U. Crime and Technology: New Frontiers for Regulation, Law Enforcement and Research. Springer, 2010.
Find full textSavona, Ernesto U. Crime and Technology: New Frontiers for Regulation, Law Enforcement and Research. Springer, 2014.
Find full textTom Clancy Net Force: Prioridades Ocultas (Planeta Internacional). Planeta Pub Corp, 2002.
Find full textQuittner, Joshua, and Michelle Slatalla. Masters of Deception: The Gang That Ruled Cyberspace. Harper Collins, 1995.
Find full textMaleh, Yassine, Ashraf Darwish, Mohammad Shojafar, and Abdelkrim Haqiq. Cybersecurity and Privacy in Cyber Physical Systems. Taylor & Francis Group, 2019.
Find full textCybersecurity and Privacy in Cyber Physical Systems. Taylor & Francis Group, 2019.
Find full text