Search Results for Exploitation. - Narrowed by: Computer crimes. SirsiDynix Enterprise https://libraryconnect.iie.ac.za/client/en_US/iie/iie/qu$003dExploitation.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026ps$003d300$0026isd$003dtrue?dt=list 2025-11-14T10:41:46Z Cybercrime and espionage : an analysis of subversive multivector threats ent://SD_ILS/0/SD_ILS:45498 2025-11-14T10:41:46Z 2025-11-14T10:41:46Z by&#160;Gragido, Will.<br/>Format:&#160;Books<br/>Publication Date&#160;2011<br/> Handbook of Internet crime ent://SD_ILS/0/SD_ILS:41134 2025-11-14T10:41:46Z 2025-11-14T10:41:46Z by&#160;Jewkes, Yvonne, 1966-<br/>Format:&#160;Books<br/>Publication Date&#160;2010<br/>