by
Shackelford, Scott J. author.
Table of contents http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-t.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html
Contributor biographical information http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-b.html
Publisher description http://catdir.loc.gov/catdir/enhancements/fy1215/2012035324-d.html
Format:
Books
Publication Date
2014
Excerpt:
Managing cyber attacks in international law, business, and relations : in search of cyber peace /
by
Sutton, David (Information security practitioner), author.
Format:
Books
Publication Date
2017
Excerpt:
; Appendix C: Cyber Security Law ; Appendix D: Cyber Security Training ; Appendix E: Links to Other Useful
by
Jewkes, Yvonne, 1966-
Format:
Books
Publication Date
2010
Excerpt:
computer law / Recent developments in UK cybercrime law / Recent developments in US internet law
by
Wells, Joseph T.
Format:
Books
Publication Date
2009
Excerpt:
crooks / Danny Miller, Michael P. Rose, and Conor Donnelly -- He fought the law / Clifford Hunter -- Eyes
by
Casey, Eoghan.
Format:
Books
Publication Date
2004
Excerpt:
Terminology of Computer Crime Investigation -- Ch. 3. Technology and Law -- Ch. 4. The Investigative Process
by
Carroll, John Millar.
Format:
Books
Publication Date
1996
Excerpt:
, Computer Security, Third Edition includes new information on: computer crime and the law; physical security
Limit Search Results
Narrowed by: