Computer crimes
Resource Information
The concept Computer crimes represents the subject, aboutness, idea or notion of resources found in University of Liverpool.
The Resource
Computer crimes
Resource Information
The concept Computer crimes represents the subject, aboutness, idea or notion of resources found in University of Liverpool.
- Label
- Computer crimes
100+ Items that share the Concept Computer crimes
Context
Context of Computer crimesSubject of
- A Practical Guide to Coping with Cyberstalking
- Alternate data storage forensics
- Black code : surveillance, privacy, and the dark side of the Internet
- Business theft and fraud : detection and prevention
- Catscan : a statement of principle
- Computer forensics for dummies
- Computer misuse : response, regulation, and the law
- Computer misuse : response, regulation, and the law
- Confronting Cyber-bullying : what schools need to know to control misconduct and avoid legal consequences
- Confronting cyber-bullying : what schools need to know to control misconduct and avoid legal consequences
- Crackproof your software : the best ways to protect your software against crackers
- Crime and the computer
- Crime and the internet
- Crime online
- Crime, deviance, and the computer
- Cyber Frauds, Scams and Their Victims
- Cyber attacks : the best defense is a good offense
- Cyber attacks and security breaches : coping with external threats
- Cyber crime : the global dimension
- Cyber crime, security and digital intelligence
- Cyber criminals on trial
- Cyber criminals on trial
- Cyber criminology
- Cyber criminology : exploring internet crimes and criminal behavior
- Cyber mercenaries : the state, hackers, and power
- Cyber operations and the use of force in international law
- Cyber reconnaissance, surveillance, and defense
- Cyber reconnaissance, surveillance, and defense
- Cyber security, cyber crime and cyber forensics : applications and perspectives
- Cyber terror and cyber risk : what you need to know
- Cyberbullying : causes, consequences, and coping strategies
- Cybercrime
- Cybercrime : the transformation of crime in the information age
- Cybercrime and Digital Forensics : An Introduction
- Cybercrime and cyberwarfare
- Cybercrime and espionage : an analysis of subversive multi-vector threats
- Cybercrime and espionage : an analysis of subversive multi-vector threats
- Cybercrime and society
- Cybercrime, digital forensics and jurisdiction
- Cybercrime, organized crime, and societal responses : international approaches
- Cybercrimes : a multidisciplinary analysis
- Cyberpsychology : the study of individuals, society and digital technologies
- Cybersecurity incident response : how to contain, eradicate, and recover from incidents
- DarkMarket : how hackers became the new mafia
- Darkweb cyber threat intelligence mining
- Data thieves in action : examining the international market for stolen personal information
- Datensicherheit : Technische und organisatorische Schutzmaßnahmen gegen Datenverlust und Computerkriminalität
- Der Mensch als Risikofaktor bei Wirtschaftskriminalität : Handlungsfähig bei Non-Compliance und Cyberkriminalität
- Digital crime and digital terrorism
- Digital evidence and computer crime : forensic science, computers and the internet
- Dot.cons : crime, deviance and identity on the internet
- Drugs on the dark net : how cryptomarkets are transforming the global trade in illicit drugs
- Economic espionage and industrial spying
- Electronic theft : unlawful acquisition in cyberspace
- Encyclopedia of information ethics and security
- Fake meds online : the internet and the transnational market in illicit pharmaceuticals
- Financial crime and gambling in a virtual world : a new frontier in cybercrime
- Foundations of computer security
- Foundations of computer security
- Guide to computer network security
- Hacker crackdown reality-check
- Handbook of Internet crime
- Handbook of Internet crime
- Information technology law
- Internet besieged : countering cyberspace scofflaws
- Introduction to cyber-warfare : a multidisciplinary approach
- Introduction to cyber-warfare : a multidisciplinary approach
- Liability for crimes involving artificial intelligence systems
- Managing cyber attacks in international law, business, and relations : in search of cyber peace
- Music piracy and crime theory
- Networks and network analysis for defence and security
- New perspectives on cybercrime
- Online othering : exploring digital violence and discrimination on the Web
- Piracy : leakages from modernity
- Policing cyber hate, cyber threats and cyber terrorism
- Policing cyberspace : a structural and cultural analysis
- Principles of cybercrime
- Principles of cybercrime
- Principles of cybercrime
- Report on the cyberpunk bust
- Rights and responsibilities of participants in networked communities
- Risk factors in computer-crime victimization
- Scienza giuridica e tecnologie informatiche
- Seven deadliest social network attacks
- Sexual violence in a digital age
- Sharing our Lives Online : Risks and Exposure in Social Media
- Sharing our lives online : risks and exposure in social media
- Software piracy exposed
- Speaking for the unspeakable and The hacker crackdown by Bruce Sterling
- Technocrime : technology, crime and social control
- Technocrime, policing and surveillance
- The Cyber Risk Handbook : Creating and Measuring Effective Cybersecurity Capabilities
- The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructure
- The cuckoo's egg by Clifford Stoll
- The cyber risk handbook : creating and measuring effective cybersecurity capabilities
- The death of the Internet
- The global cybercrime industry : economic, institutional and strategic perspectives
- The law of electronic commerce
- The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator
- The virtual battlefield : perspectives on cyber warfare
- Transnational criminal organizations, cybercrime, and money laundering : a handbook for law enforcement officers, auditors, and financial investigators
- Victimisation in a digitised society : a survey among members of the public into e-fraud, hacking and other frequently occurring crimes
- Virtual economies and financial crime : money laundering in cyberspace
- Virtual worlds and criminality
- Virtually criminal : crime, deviance and regulation online
- What is to be done about crime and punishment? : towards a 'public criminology'
- Wiki at war : conflict in a socially networked world
- Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry
- Windows Registry Forensics : Advanced Digital Forensic Analysis of the Windows Registry
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/WfEdj7A_DCw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/WfEdj7A_DCw/">Computer crimes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Concept Computer crimes
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/resource/WfEdj7A_DCw/" typeof="CategoryCode http://bibfra.me/vocab/lite/Concept"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/resource/WfEdj7A_DCw/">Computer crimes</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>