Cyber crime : concepts, methodologies, tools and applications /

"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.

Bibliographic Details
Main Author: Information Resources Management Association
Format:
Language:eng
Published: Hershey, P.A. : Information Science Reference, c201
Subjects:
_version_ 1826448571476475904
author Information Resources Management Association
author_facet Information Resources Management Association
author_sort Information Resources Management Association
collection OCEAN
description "This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.
first_indexed 2024-03-05T11:27:52Z
format
id KOHA-OAI-TEST:459330
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T11:27:52Z
publishDate c201
publisher Hershey, P.A. : Information Science Reference,
record_format dspace
spelling KOHA-OAI-TEST:4593302020-12-19T17:16:48ZCyber crime : concepts, methodologies, tools and applications / Information Resources Management Association Hershey, P.A. : Information Science Reference,c2012eng"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.Includes bibliographical references and index"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.PSZJBLComputer crimesURN:ISBN:9781613503232 (hbk.)URN:ISBN:9781613503249 (ebook)URN:ISBN:9781613503256 (print & perpetual access)
spellingShingle Computer crimes
Information Resources Management Association
Cyber crime : concepts, methodologies, tools and applications /
title Cyber crime : concepts, methodologies, tools and applications /
title_full Cyber crime : concepts, methodologies, tools and applications /
title_fullStr Cyber crime : concepts, methodologies, tools and applications /
title_full_unstemmed Cyber crime : concepts, methodologies, tools and applications /
title_short Cyber crime : concepts, methodologies, tools and applications /
title_sort cyber crime concepts methodologies tools and applications
topic Computer crimes
work_keys_str_mv AT informationresourcesmanagementassociation cybercrimeconceptsmethodologiestoolsandapplications