|
Your search for [subject]Computer crimes returned 55 records. |
|
|
Sort by:
|
|
|
|
|
|
|
|
Investigating high-tech crime.
by Knetzger, Michael R., 1972-; Upper Saddle River, NJ: Pearson/Prentice Hall, 2008.
Subject: Computer crimes -- Investigation -- United States; Computer crimes -- United States; Computer crimes -- United States -- Prevention; Computer security -- United States -- Evaluation.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cybercrime and society.
by Yar, Majid; London: SAGE Publications, 2006.
Subject: Computer crimes; Computer crimes -- Social aspects.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cybercrime and society.
by Yar, Majid.; London: Sage Pub., 2006.
Subject: Computer crimes; Computer crimes -- Social aspects.
|
|
|
|
|
|
|
|
|
|
|
|
|
Cybercrime prevention and digital forensics : report of the international workshop.
[Mandaluyong City]: Asian Development Bank Institute, 2005.
Subject: Computer crimes -- Prevention; Computer crimes -- Investigations.
|
|
|
|
|
|
|
|
|
|
|
|
|
Hackers hit Dalai Lama : report.
by Worthen, Ben.;
Subject: Dalai Lamas; Computer hackers; Computer crimes; Computer viruses.
|
|
|
|
|
|
|
|
|
|
|
|
|
Risky business : protect your business from being stalked, conned, or blackmailed on the web.
by Janal, Daniel S.; New York: Wiley, 1998.
Subject: Computer crimes; Internet (Computer network) -- Security measures; Computer security; Fraud; Extortion.
|
|
|
|
|
|
|
|
|
|
|
|
|
US donates computers for cyber crimes.
Subject: Computer crimes; Cyber-Forensic computer; Computerization - NBI.
|
|
|
|
|
|
|
|
|
|
|
|
|
Guide to computer forensics and investigations _ Computer forensics and investigations.
Boston, Mass.: Thomson Course Technology, 2008.
Subject: Computer crimes -- Investigation; Computer security.
|
|
|
|
|
|
|
|
|
|
|
|
|
The encyclopedia of high-tech crime and crime-fighting.
by Newton, Michael, 1951-; New York: Checkmark Books, 2004.
Subject: Computer crimes -- Encyclopedias; Computer viruses -- Encyclopedias; Computer hackers -- Biography.
|
|
|
|
|
|
|
|
|
|
|
|
|
Computer fraud and countermeasures.
by Krauss, Leonard I.; Englewood Cliffs, N.J.: Prentice-Hall, 1979.
Subject: Computer crimes; Computer security; Computers--Access control; Electronic data processing departments--Security measures; Fraud.
|
|
|
|
|
|
|
|
|
|
« Previous 1 2 3 4 5 6 Next » |