Spelling suggestions: "subject:"computer crimes."" "subject:"coomputer crimes.""
11 |
Research in computer forensics /Wai, Hor Cheong. January 2002 (has links) (PDF)
Thesis (M.S.)--Naval Postgraduate School, 2002. / Thesis advisor(s): Daniel F. Warren, Dan C. Boger. Includes bibliographical references (p. 191). Also available online.
|
12 |
Crime prevention and community safety : from realspace to cyberspace /Smyth, Sara Melissa. January 1900 (has links)
Thesis (LL. M.)--University of Toronto, 2005. / Includes bibliographical references.
|
13 |
The enemy in the screen a collective case study on perpetrators of Internet crimes against children /Brown, Janet M. January 2008 (has links)
Thesis (Ph.D.)--Liberty University, 2008. / The full-text of this Submission is currently under embargo. It will be available for download on Thu Sep 17 2009. Includes bibliographical references.
|
14 |
Structural equation modeling assessment of key causal factors in computer crime victimizationChoi, Kyung-shick. January 1900 (has links)
Thesis (Ph. D.)--Indiana University of Pennsylvania. / Includes bibliographical references.
|
15 |
Framework for botnet emulation and analysisLee, Christopher Patrick. January 2009 (has links)
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009. / Committee Chair: Copeland, John; Committee Member: Durgin, Gregory; Committee Member: Goodman, Seymour; Committee Member: Owen, Henry; Committee Member: Riley, George.
|
16 |
An evidence management model for web services behaviorGunestas, Murat. January 2009 (has links)
Thesis (Ph.D.)--George Mason University, 2009. / Vita: p. 167. Thesis director: Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Title from PDF t.p. (viewed Nov. 11, 2009). Includes bibliographical references (p. 159-166). Also issued in print.
|
17 |
Data visualisation in digital forensicsFei, Bennie Kar Leung. January 2007 (has links)
Thesis (M.Sc.)(Computer Science)--University of Pretoria, 2007. / Includes summary. Includes bibliographical references. Available on the Internet via the World Wide Web.
|
18 |
Gefahrenabwehr und Internet : Befugnisse der Polizei im Lichte eines Rechts auf informationelle Selbstbestimmung /Perrey, Elke, January 1900 (has links)
Thesis (doctoral)--Universität Passau, 2002. / Includes bibliographical references (p. [235]-268).
|
19 |
Using cultural perspective to study teenage computer crimeYoung, Lap-ping, John. January 2002 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 2002. / Includes bibliographical references. Also available in print.
|
20 |
Applicability of clustering to cyber intrusion detection /Hendry, Gilbert R. January 2007 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 2007. / Typescript. Includes bibliographical references (leaves 63-68).
|
Page generated in 0.0774 seconds