Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Computer crimes Computer crimes Computer networks.

Thèses sur le sujet « Computer crimes Computer crimes Computer networks »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Computer crimes Computer crimes Computer networks ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Costantini, Kevin C. "Development of a cyber attack simulator for network modeling and cyber security analysis /." Online version of thesis, 2007. http://hdl.handle.net/1850/5440.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Sanyamahwe, Tendai. "Digital forensic model for computer networks." Thesis, University of Fort Hare, 2011. http://hdl.handle.net/10353/d1000968.

Texte intégral
Résumé :
The Internet has become important since information is now stored in digital form and is transported both within and between organisations in large amounts through computer networks. Nevertheless, there are those individuals or groups of people who utilise the Internet to harm other businesses because they can remain relatively anonymous. To prosecute such criminals, forensic practitioners have to follow a well-defined procedure to convict responsible cyber-criminals in a court of law. Log files provide significant digital evidence in computer networks when tracing cyber-criminals. Network log
Styles APA, Harvard, Vancouver, ISO, etc.
3

Argauer, Brian John. "VTAC : virtual terrain assisted impact assessment for cyber attacks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4872.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Van, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.

Texte intégral
Résumé :
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway
Styles APA, Harvard, Vancouver, ISO, etc.
5

Seeley, Nathaniel. "Digital receipts : a system to detect the compromise of digital certificates /." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1590.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Fava, Daniel Schnetzer. "Characterization of cyber attacks through variable length Markov models /." Online version of thesis, 2007. http://hdl.handle.net/1850/4776.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Foster, Mark S. "Process forensics the crossroads of checkpointing and intrusion detection /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0008063.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Lee, Christopher Patrick. "Framework for botnet emulation and analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28191.

Texte intégral
Résumé :
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.<br>Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Judd, Aaron C. "Improved Network Security and Disguising TCP/IP Fingerprint Through Dynamic Stack Modification /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FJudd.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Kortjan, Noloxolo. "A cyber security awareness and education framework for South Africa." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1014829.

Texte intégral
Résumé :
The Internet is becoming increasingly interwoven in the daily life of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business and has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks. One of these risks is cybercrime. The Internet has given criminals a platform on which to grow and proliferate. As a result of the abstract nature of the Internet, it is easy
Styles APA, Harvard, Vancouver, ISO, etc.
11

Kwan, Yuk-kwan, and 關煜群. "The research of using Bayesian inferential network in digital forensicanalysis." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45898066.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
12

McConky, Katie Theresa. "Design and analysis of information fusion, dynamic sensor management rules for cyber security systems using simulation /." Online version of thesis, 2007. http://hdl.handle.net/1850/4895.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Ibekwe, Chibuko Raphael. "The legal aspects of cybercrime in Nigeria : an analysis with the UK provisions." Thesis, University of Stirling, 2015. http://hdl.handle.net/1893/22786.

Texte intégral
Résumé :
Cybercrime offences know no limits to physical geographic boundaries and have continued to create unprecedented issues regarding to the feasibility and legitimacy of applying traditional legislations based on geographic boundaries. These offences also come with procedural issues of enforcement of the existing legislations and continue to subject nations with problems unprecedented to its sovereignty and jurisdictions. This research is a critical study on the legal aspects of cybercrime in Nigeria, which examines how laws and regulations are made and applied in a well-established system to effe
Styles APA, Harvard, Vancouver, ISO, etc.
14

Tsudama, Brett. "A novel distributed denial-of-service detection algorithm." DigitalCommons@CalPoly, 2004. https://digitalcommons.calpoly.edu/theses/1650.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Jiang, Lin, and 蒋琳. "New cryptographic schemes with application in network security and computer forensics." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B44753226.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
16

Gottschalk, Jason Howard. "Towards an evaluation and protection strategy for critical infrastructure." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1018793.

Texte intégral
Résumé :
Critical Infrastructure is often overlooked from an Information Security perspective as being of high importance to protect which may result in Critical Infrastructure being at risk to Cyber related attacks with potential dire consequences. Furthermore, what is considered Critical Infrastructure is often a complex discussion, with varying opinions across audiences. Traditional Critical Infrastructure included power stations, water, sewage pump stations, gas pipe lines, power grids and a new entrant, the “internet of things”. This list is not complete and a constant challenge exists in identify
Styles APA, Harvard, Vancouver, ISO, etc.
17

Hashim, Noor Hayati. "An architecture for the forensic analysis of Windows system generated artefacts." Thesis, University of South Wales, 2011. https://pure.southwales.ac.uk/en/studentthesis/forensic-analysis-of-windows-system-generated-artefacts(be571569-2afe-4d52-8c99-9dbc8388b1db).html.

Texte intégral
Résumé :
Computer forensic tools have been developed to enable forensic investigators to analyse software artefacts to help reconstruct possible scenarios for activity on a particular computer system. A number of these tools allow the examination and analysis of system generated artefacts such as the Windows registry. Examination and analysis of these artefacts is focussed on recovering the data extracting information relevant to a digital investigation. This information is currently underused in most digital investigations. With this in mind, this thesis considers system generated artefacts that conta
Styles APA, Harvard, Vancouver, ISO, etc.
18

Gu, Guofei. "Correlation-based Botnet Detection in Enterprise Networks." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24634.

Texte intégral
Résumé :
Most of the attacks and fraudulent activities on the Internet are carried out by malware. In particular, botnets, as state-of-the-art malware, are now considered as the largest threat to Internet security. In this thesis, we focus on addressing the botnet detection problem in an enterprise-like network environment. We present a comprehensive correlation-based framework for multi-perspective botnet detection consisting of detection technologies demonstrated in four complementary systems: BotHunter, BotSniffer, BotMiner, and BotProbe. The common thread of these systems is correlation analysis,
Styles APA, Harvard, Vancouver, ISO, etc.
19

Ransbotham, III Samuel B. "Acquisition and diffusion of technology innovation." Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Texte intégral
Résumé :
Thesis (M. S.)--Management, Georgia Institute of Technology, 2008.<br>Committee Chair: Sabyasachi Mitra; Committee Member: Frank Rothaermel; Committee Member: Sandra Slaughter; Committee Member: Sridhar Narasimhan; Committee Member: Vivek Ghosal.
Styles APA, Harvard, Vancouver, ISO, etc.
20

McRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Fairbanks, Kevin D. "Forensic framework for honeypot analysis." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/33977.

Texte intégral
Résumé :
The objective of this research is to evaluate and develop new forensic techniques for use in honeynet environments, in an effort to address areas where anti-forensic techniques defeat current forensic methods. The fields of Computer and Network Security have expanded with time to become inclusive of many complex ideas and algorithms. With ease, a student of these fields can fall into the thought pattern of preventive measures as the only major thrust of the topics. It is equally important to be able to determine the cause of a security breach. Thus, the field of Computer Forensics has grow
Styles APA, Harvard, Vancouver, ISO, etc.
22

Melo, Sandro Pereira de. "Taxonomia de técnicas furtivas e antiforenses utilizadas em ataques cibernéticos." Pontifícia Universidade Católica de São Paulo, 2018. https://tede2.pucsp.br/handle/handle/21181.

Texte intégral
Résumé :
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-06-26T12:35:40Z No. of bitstreams: 1 Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5)<br>Made available in DSpace on 2018-06-26T12:35:40Z (GMT). No. of bitstreams: 1 Sandro Pereira de Melo.pdf: 2533198 bytes, checksum: d31cf0cd607774a7541de96797446970 (MD5) Previous issue date: 2018-03-19<br>Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES<br>According to the current academic literature, numerous taxonomic proposals for the classification of cyber threats have been pre
Styles APA, Harvard, Vancouver, ISO, etc.
23

Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Texte intégral
Résumé :
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunicatio
Styles APA, Harvard, Vancouver, ISO, etc.
24

Alharbi, Hani Sayyaf. "Novel analytical modelling-based simulation of worm propagation in unstructured peer-to-peer networks." Thesis, University of Stirling, 2017. http://hdl.handle.net/1893/25389.

Texte intégral
Résumé :
Millions of users world-wide are sharing content using Peer-to-Peer (P2P) networks, such as Skype and Bit Torrent. While such new innovations undoubtedly bring benefits, there are nevertheless some associated threats. One of the main hazards is that P2P worms can penetrate the network, even from a single node and then spread rapidly. Understanding the propagation process of such worms has always been a challenge for researchers. Different techniques, such as simulations and analytical models, have been adopted in the literature. While simulations provide results for specific input parameter va
Styles APA, Harvard, Vancouver, ISO, etc.
25

Egan, Shaun Peter. "A framework for high speed lexical classification of malicious URLs." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011933.

Texte intégral
Résumé :
Phishing attacks employ social engineering to target end-users, with the goal of stealing identifying or sensitive information. This information is used in activities such as identity theft or financial fraud. During a phishing campaign, attackers distribute URLs which; along with false information, point to fraudulent resources in an attempt to deceive users into requesting the resource. These URLs are made obscure through the use of several techniques which make automated detection difficult. Current methods used to detect malicious URLs face multiple problems which attackers use to their ad
Styles APA, Harvard, Vancouver, ISO, etc.
26

Erdonmez, Erhan. "Investigation of Computer Crimes." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3185/.

Texte intégral
Résumé :
In this study, the development of the computer related crime will be examined in the first chapter. After a detailed introduction to computer crimes, the most common types of the computer crimes will be examined and the characteristics of the offenders and their motivates will be identified. The general investigation process of the computer crime investigation will be outlined in the second chapter. After attempting to define computer crime, computer criminals and investigation process, a case study related to the topic will be examined and the characteristics and the motives of the criminals
Styles APA, Harvard, Vancouver, ISO, etc.
27

Steh, Stephen. "Unauthorized access crimes /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

孫陸陽. "暗網絡犯罪的刑法問題研究 =Research on criminal law of dark network crime". Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950654.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Samsuddin, Samsuddin Wira Bin Tu Manghui. "Digital forensics curriculum for undergraduate and master graduate students." [Cedar City, Utah] : Southern Utah University, 2009. http://unicorn.li.suu.edu/ScholarArchive/ForensicScience/SamsuddinWira.pdf.

Texte intégral
Résumé :
Thesis (M.S.)--Southern Utah University, 2009.<br>Title from PDF title page. "Thesis presented to the faculty of the Graduate School of Southern Utah University in partial fulfillment of the requirements for the degree of Master of Science in Forensic Science, Computer Forensics Emphasis." Manghui Tu, Advisor. Includes bibliographical references (p. 83-88).
Styles APA, Harvard, Vancouver, ISO, etc.
30

Imhof, Robert. "Cyber crime and telecommunications law /." Online version of thesis, 2010. http://hdl.handle.net/1850/12268.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Steh, Stephen R. "Unauthorized Access Crimes." Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Wai, Hor Cheong. "Research in computer forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FHor.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
33

Hendry, Gilbert R. "Applicability of clustering to cyber intrusion detection /." Online version of thesis, 2007. http://hdl.handle.net/1850/4777.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Bassi, Steven D. "An automated acquisition system for media exploitation." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483619.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2008.<br>Thesis Advisor(s): Garfinkel, Simson L. "June 2008." Description based on title screen as viewed on August 28, 2008. Includes bibliographical references (p. 55-56). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Stimson, Jared M. "Forensic analysis of Window's® virtual memory incorporating the system's page-file." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FStimson.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2008.<br>Thesis Advisor(s): Eagle, Chris S. "December 2008." Description based on title screen as viewed on February 2, 2009. Includes bibliographical references (p. 89-90). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Maliehe, Mamotumi. "Cybercrime Legislation in Lesotho." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/4662.

Texte intégral
Résumé :
This paper advocates introducing cybercrime legislation in Lesotho. Cybercrime is the hottest issue today. Cybercriminals can commit various illegal activities in cyberspace that few people even know exist. A nightmare scenario would be a hacker breaking into the hospital's computer systems on a fine morning and before doctors can arrive to treat their patients, the malicious hacker modifies patients' files on the hospital's database systems: [S]urgeries slated to be performed on the right leg are now switched to the left leg; recorded blood types are altered from AB-negative to O-positive; wa
Styles APA, Harvard, Vancouver, ISO, etc.
37

Young, Lap-ping John. "Using cultural perspective to study teenage computer crime." Click to view the E-thesis via HKUTO, 2002. http://sunzi.lib.hku.hk/hkuto/record/B31979415.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Law, Yuet-wing, and 羅越榮. "Investigation models for emerging computer forensic challenges." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B46971324.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Cassidy, Regis H. Friend. "Automating case reports for the analysis of digital evidence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCassidy.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Hunter, Harry A. "Computer crime and identity theft." [Denver, Colo.] : Regis University, 2010. http://adr.coalliance.org/codr/fez/view/codr:144.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

Sonnekus, Michael Hendrik. "A comparison of open source and proprietary digital forensic software." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017939.

Texte intégral
Résumé :
Scrutiny of the capabilities and accuracy of computer forensic tools is increasing as the number of incidents relying on digital evidence and the weight of that evidence increase. This thesis describes the capabilities of the leading proprietary and open source digital forensic tools. The capabilities of the tools were tested separately on digital media that had been formatted using Windows and Linux. Experiments were carried out with the intention of establishing whether the capabilities of open source computer forensics are similar to those of proprietary computer forensic tools, and whether
Styles APA, Harvard, Vancouver, ISO, etc.
42

Proffitt, Tim Gene. "The Effects of Computer Crimes on the Management of Disaster Recovery." ScholarWorks, 2018. https://scholarworks.waldenu.edu/dissertations/5252.

Texte intégral
Résumé :
The effects of a technology disaster on an organization can include a prolonged disruption, loss of reputation, monetary damages, and the inability to remain in business. Although much is known about disaster recovery and business continuance, not much research has been produced on how businesses can leverage other technology frameworks to assist information technology disaster recovery. The problem was the lack of organizational knowledge to recover from computer crime interruptions given the maturity level of existing disaster recovery programs. The purpose of this Delphi study was to unders
Styles APA, Harvard, Vancouver, ISO, etc.
43

Neophytou, Andonis. "Computer security : data control and protection." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834504.

Texte intégral
Résumé :
Computer security is a crucial area for any organization based on electronic devices that process data. The security of the devices themselves and the data they process are the backbone of the organization. Until today there have been no completely secure systems or procedures until and a lot of research is being done in this area. It impossible for a machine or a mechanical procedure to "guess" all possible events and lead to conclusive, cohesive and comprehensive secure systems, because of: 1) the human factor, and 2) acts of nature (fire, flood etc). However, proper managerial control can a
Styles APA, Harvard, Vancouver, ISO, etc.
44

Ibarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.

Texte intégral
Résumé :
The main goal of this thesis is to provide a sociologically informed analysis of tax avoidance and tax evasion in contemporary Mexico and Sweden, focusing particular attention on the explanatory role of social networks, social interactions, and positive feedback mechanisms. Two major data sources are used: (1) A panel dataset that includes all persons, 16 years or older, who resided in Stockholm County during at least one of the years 1990 to 2003 (N=1,967,993). The dataset includes detailed information on the socio-demographic characteristics, kinship networks, and criminal offences of these
Styles APA, Harvard, Vancouver, ISO, etc.
45

Zomba, Lincoln Benn. "Computer related crimes: a comparative analysis of Tanzanian and South African frameworks." Thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/13039.

Texte intégral
Résumé :
Includes bibliographical references.<br>'Unknown to most of us, we are living inside and alongside a revolution of stupendous power and energy. It is not a communist, socialist, capitalist or even a religious revolution. It is the ICT revolution, the revolution of information communication technologies that is changing the nature and patterns of our social, commercial and political interactions. Like most revolutions, its true scope cannot yet be grasped nor can all the issues it raises be clearly understood even by those at its cutting edges". The Internet and other new technologies play an i
Styles APA, Harvard, Vancouver, ISO, etc.
46

Gunestas, Murat. "An evidence management model for web services behavior." Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/5631.

Texte intégral
Résumé :
Thesis (Ph.D.)--George Mason University, 2009.<br>Vita: p. 167. Thesis director: Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Nov. 11, 2009). Includes bibliographical references (p. 159-166). Also issued in print.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Fei, Bennie Kar Leung. "Data visualisation in digital forensics." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-03072007-153241.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Urrea, Jorge Mario. "An analysis of Linux RAM forensics." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FUrrea.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science) Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Christopher S. Eagle. "March 2006." Includes bibliographical references (p.71-72). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
49

Costa, Fernando José da. "Locus delicti nos crimes informáticos." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/2/2136/tde-24042012-112445/.

Texte intégral
Résumé :
Aborda a introdução do computador e da internet na sociedade e sua relação com o direito. Discorre sobre o uso da informática para a prática de crime, observando que o delito penal deixou de ser local e ganhou dimensões internacionais, porquanto seu resultado não se dê necessariamente no mesmo local onde foi praticada a conduta. Chama a atenção ao fato de que os princípios delimitadores da validade da lei penal no espaço podem não ser suficientes para dirimir eventuais conflitos de jurisdição, se interpretados como tradicionalmente se tem feito. Analisa e classifica as espécies de crimes infor
Styles APA, Harvard, Vancouver, ISO, etc.
50

Hewling, Moniphia Orlease. "Digital forensics : an integrated approach for the investigation of cyber/computer related crimes." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/326231.

Texte intégral
Résumé :
Digital forensics has become a predominant field in recent times and courts have had to deal with an influx of related cases over the past decade. As computer/cyber related criminal attacks become more predominant in today’s technologically driven society the need for and use of, digital evidence in courts has increased. There is the urgent need to hold perpetrators of such crimes accountable and successfully prosecuting them. The process used to acquire this digital evidence (to be used in cases in courts) is digital forensics. The procedures currently used in the digital forensic process wer
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!