A mostrar 1 - 14 resultados de 14 para a pesquisa '(( _ call computer crime new ) OR ((( j l campa can new ) OR ( j _ con same netw ))))*', tempo de pesquisa: 0.72seg Refinar resultados
3
... for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial...
Obter o texto integral
Artigo
4
Por Sammes, Anthony., Jenkinson, Brian
Publicado em 2007
Assuntos: ...Crime por computador Investigação....
Obter o texto integral
Livro
5
Por Guo, Qi, Schmidt, Marjanka K., Kraft, Peter, Canisius, Sander, Chen, Constance, Khan, Sofia, Tyrer, Jonathan, Bolla, Manjeet K., Wang, Qin, Dennis, Joe, Michailidou, Kyriaki, Lush, Michael, Kar, Siddhartha, Beesley, Jonathan, Dunning, Alison M., Shah, Mitul, Czene, Kamila, Darabi, Hatef, Eriksson, Mikael, Lambrechts, Diether, Weltens, Caroline, Leunen, Karin, Bojesen, Stig E., Nordestgaard, Børge G., Nielsen, Sune F., Flyger, Henrik, Chang-Claude, Jenny, Rudolph, Anja, Seibold, Petra, Flesch-Janys, Dieter, Blomqvist, Carl, Aittomäki, Kristiina, Fagerholm, Rainer, Muranen, Taru A., Couch, Fergus J., Olson, Janet E., Vachon, Celine, Andrulis, Irene L., Knight, Julia A., Glendon, Gord, Mulligan, Anna Marie, Broeks, Annegien, Hogervorst, Frans B., Haiman, Christopher A., Henderson, Brian E., Schumacher, Fredrick, Le Marchand, Loic, Hopper, John L., Tsimiklis, Helen, Apicella, Carmel, Southey, Melissa C., Cox, Angela, Cross, Simon S., Reed, Malcolm W. R., Giles, Graham G., Milne, Roger L., McLean, Catriona, Winqvist, Robert, Pylkäs, Katri, Jukkola-Vuorinen, Arja, Grip, Mervi, Hooning, Maartje J., Hollestelle, Antoinette, Martens, John W. M., van den Ouweland, Ans M. W., Marme, Federik, Schneeweiss, Andreas, Yang, Rongxi, Burwinkel, Barbara, Figueroa, Jonine, Chanock, Stephen J., Lissowska, Jolanta, Sawyer, Elinor J., Tomlinson, Ian, Kerin, Michael J., Miller, Nicola, Brenner, Hermann, Dieffenbach, Aida Karina, Arndt, Volker, Holleczek, Bernd, Mannermaa, Arto, Kataja, Vesa, Kosma, Veli-Matti, Hartikainen, Jaana M., Li, Jingmei, Brand, Judith S., Humphreys, Keith, Devilee, Peter, Tollenaar, Rob A. E. M., Seynaeve, Caroline, Radice, Paolo, Peterlongo, Paolo, Bonanni, Bernardo, Mariani, Paolo, Fasching, Peter A., Beckmann, Matthias W., Hein, Alexander, Ekici, Arif B., Chenevix-Trench, Georgia, Balleine, Rosemary, Phillips, Kelly-Anne, Benitez, Javier, Zamora, M. Pilar, Arias Perez, Jose Ignacio, Menéndez, Primitiva, Jakubowska, Anna, Lubinski, Jan, Jaworska-Bieniek, Katarzyna, Durda, Katarzyna, Hamann, Ute, Kabisch, Maria, Ulmer, Hans Ulrich, Rüdiger, Thomas, Margolin, Sara, Kristensen, Vessela, Nord, Silje, Evans, D. Gareth, Abraham, Jean E., Earl, Helena M., Hiller, Louise, Dunn, Janet A., Bowden, Sarah, Berg, Christine, Campa, Daniele, Diver, W. Ryan, Gapstur, Susan M., Gaudet, Mia M., Hankinson, Susan E., Hoover, Robert N., Hüsing, Anika, Kaaks, Rudolf, Machiela, Mitchell J., Willett, Walter, Barrdahl, Myrto, Canzian, Federico, Chin, Suet-Feung, Caldas, Carlos, Hunter, David J., Lindstrom, Sara, García-Closas, Montserrat, Hall, Per, Easton, Douglas F., Eccles, Diana M., Rahman, Nazneen, Nevanlinna, Heli, Pharoah, Paul D. P.
Publicado no J Natl Cancer Inst (2015)
... tests were two-sided. RESULTS: We identified one new locus (rs2059614 at 11q24.2) associated...
Obter o texto integral
Obter o texto integral
Obter o texto integral
Artigo
6
Por P. V. Tereliansky, A. S. Zyabkin
Publicado em 2020-05-01
... critical information infrastructure; growth of computer crime scales....
Obter o texto integral
Artigo
8
Por Gehl, Robert W., Lawson, Sean T
Publicado no The MIT Press (2022)
Assuntos: ...bic Book Industry Communication::J Society & social sciences::JK Social services & welfare...
Obter o texto integral
Livro
9
Por Arquilla, John, Ronfeldt, David
Publicado em 1997
Assuntos: ...thema EDItEUR::U Computing and Information Technology::UD Digital Lifestyle and online world...
Obter o texto integral
Livro
10
Por Che-Yi Chao, Ja-Chen Lin
Publicado em 2020-05-01
.... Type 1 is our so-called forbidden type. In its sharing system, any <i>t</i> of the n shares can recover...
Obter o texto integral
Artigo
11
Por Junayed Islam, Kai Xu, William Wong
Publicado em 2018-02-01
... introduced a system called “PROV” to capture, visualize and utilize analytical information named as analytic...
Obter o texto integral
Artigo
12
Por Emily Hansell Clark
Publicado em 2018-04-01
... material that already existed, with the possibility of alternative meaning: “We can’t call house music...
Obter o texto integral
Artigo
13
Por Ziccardi, Giovanni.
Publicado em 2013
... dissidents. Moving from the difference between hacking and computer crimes, the book explains concepts...
Obter o texto integral
Livro
14
Por Kowalczewska, Kaja, Kijewska, Barbara
Publicado em 2022
... – especially in times of disinformation and fake news – can provide a reliable source of information and sights...
Obter o texto integral
Online