Your search returned 90 results. Subscribe to this search

|
1. The threat of computer crime: identifying the problem and formulating a response at force level

by Bliss, Andy | Harfield, Clive.

Material type: article Article Publisher: 1998Barcode no: AR37384.Availability: Items available for loan: (1).

2. Computer frauds - law enforcements response

by Ponnoly, Joseph.

Material type: article Article Publisher: 1998Barcode no: AR38341.Availability: Items available for loan: (1).

3. Computer crime and hacking: a serious issue for the police

by Griffiths, Mark.

Material type: article Article Publisher: 2000Barcode no: AR45554.Availability: Items available for loan: (1).

4. Cyber crime - a challenge to forensic science

by Nanda, B.B | Tewari, R.K.

Material type: article Article Publisher: 2000Barcode no: AR48014.Availability: Items available for loan: (1).

5. Information privacy and marketing: what the US should (and shouldn't) learn from Europe

by Smith, H. Jeff.

Material type: article Article Publisher: 2001Barcode no: AR49335.Availability: Items available for loan: (1).

6. A plaugue of viruses: biological, computer and marketing

by Boase, Jeffrey | Wellman Barry.

Material type: article Article Publisher: 2001Barcode no: AR52083.Availability: Items available for loan: (1).

7. Cyber-crimes prevention & control strategies

by Amarnathan, L.C.

Material type: article Article Publisher: 2002Barcode no: AR53614.Availability: Items available for loan: (1).

8. Cyber security

by Dikshit, R.C.

Material type: article Article Publisher: 2002Barcode no: AR54116.Availability: Items available for loan: (1).

9. Management's role in information security in a cyber economy

by Dutta, Amitava | McCrohan, Kevin.

Material type: article Article Publisher: 2002Barcode no: AR55214.Availability: Items available for loan: (1).

10. Cyber crime-investigation and prevention

by Chawla, A.S.

Material type: article Article Publisher: 2003Barcode no: AR59123.Availability: Items available for loan: (1).

11. Cyber terrorism: a myth or possibility

by Chander, Kuktesh.

Material type: article Article Publisher: 2003Barcode no: AR60268.Availability: Items available for loan: (1).

12. Emerging trends in cyber frauds in India

by Saravade, Nand Kumar | Saravade, Pradnya.

Material type: article Article Publisher: 2003Barcode no: AR60340.Availability: Items available for loan: (1).

13. New technologies and the constitution of theft

by Rajan, Nalini.

Material type: article Article Publisher: 2005Barcode no: AR69127.Availability: Items available for loan: (1).

14. Cyberterrorism: a tool of asymmetric warfare

by Lakhanpal, Vikrant.

Material type: article Article Publisher: 2006Barcode no: AR73249.Availability: Items available for loan: (1).

15. Cyber-space security

by Sandias, Ved Prakash.

Material type: article Article Publisher: 2006Barcode no: AR73250.Availability: Items available for loan: (1).

16. Corporate and government computers hacked by juveniles

by Radnofsky, Mary L.

Material type: article Article Publisher: 2006Barcode no: AR73314.Availability: Items available for loan: (1).

17. Study of status and legal framework of cyber crimes - an Indian perspective

by Pandey, Sunil Kr | Gupta, Pankaj.

Material type: article Article Publisher: 2006Barcode no: AR73317.Availability: Items available for loan: (1).

18. The crime of technology: identity theft

by Alkadi, Ihssan | Lawrence, Lisa | Alkadi, Ghassan.

Material type: article Article Publisher: 2006Barcode no: AR73336.Availability: Items available for loan: (1).

19. Cyber crime and jurisdictional problem

by Gupta, Arun Kumar.

Material type: article Article Publisher: 2006Barcode no: AR75054.Availability: Items available for loan: (1).

20. Cyber crime - a global concern

by Paranjapee, Vishwanath.

Material type: article Article Publisher: 2007Barcode no: AR78157.Availability: Items available for loan: (1).

Powered by Koha