Cyber crime : concepts, methodologies, tools and applications /
"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.
Main Author: | |
---|---|
Format: | |
Language: | eng |
Published: |
Hershey, P.A. : Information Science Reference,
c201
|
Subjects: |
_version_ | 1826448571476475904 |
---|---|
author | Information Resources Management Association |
author_facet | Information Resources Management Association |
author_sort | Information Resources Management Association |
collection | OCEAN |
description | "This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher. |
first_indexed | 2024-03-05T11:27:52Z |
format | |
id | KOHA-OAI-TEST:459330 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T11:27:52Z |
publishDate | c201 |
publisher | Hershey, P.A. : Information Science Reference, |
record_format | dspace |
spelling | KOHA-OAI-TEST:4593302020-12-19T17:16:48ZCyber crime : concepts, methodologies, tools and applications / Information Resources Management Association Hershey, P.A. : Information Science Reference,c2012eng"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.Includes bibliographical references and index"This is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law"--Provided by publisher.PSZJBLComputer crimesURN:ISBN:9781613503232 (hbk.)URN:ISBN:9781613503249 (ebook)URN:ISBN:9781613503256 (print & perpetual access) |
spellingShingle | Computer crimes Information Resources Management Association Cyber crime : concepts, methodologies, tools and applications / |
title | Cyber crime : concepts, methodologies, tools and applications / |
title_full | Cyber crime : concepts, methodologies, tools and applications / |
title_fullStr | Cyber crime : concepts, methodologies, tools and applications / |
title_full_unstemmed | Cyber crime : concepts, methodologies, tools and applications / |
title_short | Cyber crime : concepts, methodologies, tools and applications / |
title_sort | cyber crime concepts methodologies tools and applications |
topic | Computer crimes |
work_keys_str_mv | AT informationresourcesmanagementassociation cybercrimeconceptsmethodologiestoolsandapplications |