Cybercrime: conceptualized and codified / Richard Anderson and Kadema Carter, editors.
Material type: TextPublisher: New York : Arcler Press, 2015Description: xi, 294 pages : illustrations ; 25 cmContent type:- text
- unmediated
- volume
- 9781680941418
- 364.1680973 C992
- HV6773.2
Item type | Current library | Shelving location | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
Books | Main Library-Nabua | Circulation Section | CIR 364.1680973 C992 2015 (Browse shelf(Opens below)) | 1-1 | Available | 026202 |
Browsing Main Library-Nabua shelves, Shelving location: Circulation Section Close shelf browser (Hides shelf browser)
CIR 364.1523 O181y 2019 If you tell : a true story of murder, family secrets, and the unbreakable bond of sisterhood / | CIR 364.16287092 Am68w 2020 The woman who stole Vermeer : the true story of Rose Dugdale and the Russborough House art heist / | CIR 364.16287092 Am68w 2020 The woman who stole Vermeer : the true story of Rose Dugdale and the Russborough House art heist / | CIR 364.1680973 C992 2015 Cybercrime: conceptualized and codified / | CIR 364.60973 B340p 2013 Probation, parole, and community-based corrections : supervision, treatment, and evidence-based practices/ | CIR 364.60973 B340p 2013 Probation, parole, and community-based corrections : supervision, treatment, and evidence-based practices/ | CIR 364.973 C868 2009 Criminal justice 08/09 |
Includes bibliographical references and index.
Digital forensics and cyber crime datamining -- A socio-technical approach to cyber risk management and impact assessment -- Cyber terrorism approach -- Awareness of the potential threat of cyberterrorism to the national security -- Crime prevention in ethnic areas focusing on crime prevention through environmental design -- Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon- Loeb model -- Optimized combined-clustering methods for finding replicated criminal websites -- Detection and analysis of the chameleon Wifi access point virus -- Machine learning techniques -- Crimefighter investigator: integrating synthesis and sense making for criminal network investigation -- IP traceback through (Authenticated) deterministic flow marking: an empirical evaluation -- Technology of secure file archiving in the uniformly random distributed archive scheme -- Threat assessment based on organization's information security policy.
There are no comments on this title.