A mostrar 1 - 20 resultados de 76 para a pesquisa '(( j la combe juan net ) OR ((( a cost computer crime new ) OR ( a 1 computer crime new ))))', tempo de pesquisa: 0.85seg Refinar resultados
5
6
Por Javed, Omar., Shah, Mubarak.
Publicado em 2008
...The international series in video computing...
Obter o texto integral
Livro
7
Por Irene Amerini, Chang-Tsun Li, Nasir Memon, Jiwu Huang
Publicado em 2020-01-01
... inference in the fight against crime. This Special Section in IEEE Access aims to collect a diverse...
Obter o texto integral
Artigo
8
Por Lisbach, Bertrand., Meyer, Victoria.
Publicado em 2013
... of struggling with computational techniques, the new linguistic identity matching approach finally offers...
Obter o texto integral
Livro
9
10
11
... for such activities throughout their entire lives. We define a new category of cyber crime called a Personal Denial...
Obter o texto integral
Artigo
12
Publicado em 2007
... market and financial crime Bribery and extortion Computer and identity fraud Health care fraud Crime...
Obter o texto integral
Livro
14
Publicado em 2019
Assuntos: ...thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV...
Obter o texto integral
Livro
15
Por Scrivens, Ryan, Conway, Maura
Publicado em 2019
Assuntos: ...thema EDItEUR::J Society and Social Sciences::JK Social services and welfare, criminology::JKV...
Obter o texto integral
Livro
16
Por Aycock, John Daniel.
Publicado em 2006
...Our Internet-connected society increasingly relies on computers. As a result, attacks on computers...
Obter o texto integral
Livro
17
Publicado em 2025
Assuntos: ...Hate Crime;Hate Speech;Online Harm;Social Harm;Misogyny;Incels;Pornography;Radicalization;Anti...
Obter o texto integral
Livro
18
Por Gehl, Robert W., Lawson, Sean T
Publicado no The MIT Press (2022)
Assuntos: ...bic Book Industry Communication::J Society & social sciences::JK Social services & welfare...
Obter o texto integral
Livro
19
Por Didik Sudyana, Reza Tanujiwa Putra, Soni Soni
Publicado em 2019-03-01
... in purchasing new servers and maintenance because virtualization allows one server to run with multiple...
Obter o texto integral
Artigo
20
Por Goran Samuel Pesic
Publicado em 2018-03-01
... countries see this type of crime as a normal way to gain access to foreign business information is often...
Obter o texto integral
Artigo