-
1
Hide your a[ss]et[s] and disappear : a step-by-step guide to vanishing without a trace
New York : Regenbooks, 2000Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
2
Bullying beyond the schoolyard : preventing and responding to cyberbullying
Thousand Oaks, Calif. : Corwin Press, 2009Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
3
Computer crime
New York : Lodestar Books, 1987
1st ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
4
A comparison of digital forensics software : FTK and ProDiscover
Format: Thesis Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
5
Cyber crime
Detroit : Greenhaven Press, 2009Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
6
Computer crime : a crimefighter's handbook
Sebastopol, CA : O'Reilly & Associates, 1995
1st ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
7
Fatal system error : the hunt for the new crime lords who are bringing down the Internet
New York, NY : PublicAffairs, 2010
1st ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
8
Cybercrime : a reference handbook
Santa Barbara, Calif. : ABC-CLIO, 2004Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
9
Poker game
Garden City, New York : Doubleday & Company, Inc., 1983
First edition.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
10
Encyclopedia of cybercrime
Westport, Conn. : Greenwood Press, 2009Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
11
Tools and weapons : the promise and the peril of the digital age
[United States] : Penguin Books, 2021
Revised and updated.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
12
Electronic theft : unlawful acquisition in cyberspace
Cambridge, U.K. ; New York : Cambridge University Press, 2001Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
13
School social workers' awareness of adolescent cyberbullying
Format: Thesis Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
14
Fundamentals of computer-high technology law
Philadelphia, Pa. : American Law Institute-American Bar Association Committee on Continuing Professional Education, 1991Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
15
Managerial guide for handling cyber-terrorism and information warfare
Hershey PA : Idea Group Pub., 2005Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
16
Addressing emerging cybersecurity threats to state and local government : hearing before the Subcommittee on Emerging Threats and Spending Oversight of the Committee on Homeland Se...
Washington : U.S. Government Publishing Office, 2021Format: Government Document Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
17
Approaching zero : the extraordinary underworld of hackers, phreakers, virus writers, and keyboard criminals
New York : Random House, 1992
1st American ed.Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
18
Shirley Homes and the cyber thief
Oxford : Oxford University Press, 2013Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
19
Netspionage : the global threat to information
Boston : Butterworth-Heinemann, 2000Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?> -
20
Crime and technology : new frontiers for regulation, law enforcement and research
Dordrecht, Netherlands : Springer, 2004Format: Book
//IF NOT LOGGED IN - FORCE LOGIN ?>
//ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>