Tomeki

Explore Books on
computer crimes

1-24 of 2,831 Books

View Criminal law By Great Britain. Law Commission.,Law Commission,Henry Brooke
Cover of Criminal law by great britain. law commission.,law commission,henry brooke

Criminal law

By Great Britain. Law Commission.,Law Commission,Henry Brooke

View Little Brother By Cory Doctorow
Cover of Little Brother by cory doctorow

Little Brother

By Cory Doctorow

View Tom Clancy's Net Force By Tom Clancy,Steve R. Pieczenik
Cover of Tom Clancy's Net Force by tom clancy,steve r. pieczenik

Tom Clancy's Net Force

By Tom Clancy,Steve R. Pieczenik

View Wildcard By Marie Lu
Cover of Wildcard by marie lu

Wildcard

By Marie Lu

View Warcross By Marie Lu
Cover of Warcross by marie lu

Warcross

By Marie Lu

View The Hacker Crackdown By Bruce Sterling
Cover of The Hacker Crackdown by bruce sterling

The Hacker Crackdown

By Bruce Sterling

View Missing You By Harlan Coben,January LaVoy
Cover of Missing You by harlan coben,january lavoy

Missing You

By Harlan Coben,January LaVoy

View Cybercrime and Digital Forensics By Thomas J. Holt,Adam M. Bossler,Kathryn C. Seigfried-Spellar
Cover of Cybercrime and Digital Forensics by thomas j. holt,adam m. bossler,kathryn c. seigfried-spellar

Cybercrime and Digital Forensics

By Thomas J. Holt,Adam M. Bossler,Kathryn C. Seigfried-Spellar

View Hackers By Steven Levy
Cover of Hackers by steven levy

Hackers

By Steven Levy

View The Cuckoo’s Egg By Clifford Stoll
Cover of The Cuckoo’s Egg by clifford stoll

The Cuckoo’s Egg

By Clifford Stoll

View Policing in Hong Kong By Kam C. Wong
Cover of Policing in Hong Kong by kam c. wong

Policing in Hong Kong

By Kam C. Wong

View Cybersecurity Law By Jeff Kosseff
Cover of Cybersecurity Law by jeff kosseff

Cybersecurity Law

By Jeff Kosseff

View Cybercrime By Alisdair A. Gillespie
Cover of Cybercrime by alisdair a. gillespie

Cybercrime

By Alisdair A. Gillespie

View Information Security and Cryptology By Dongdai Lin,Shouhuai Xu,Moti Yung
Cover of Information Security and Cryptology by dongdai lin,shouhuai xu,moti yung

Information Security and Cryptology

By Dongdai Lin,Shouhuai Xu,Moti Yung

View C'è un pirata in Internet By Elisabetta Dami
Cover of C'è un pirata in Internet by elisabetta dami

C'è un pirata in Internet

By Elisabetta Dami

View Katie.com By Tarbox, Katherine.,Katherine Tarbox,Katherine Tarbox
Cover of Katie.com by tarbox, katherine.,katherine tarbox,katherine tarbox

Katie.com

By Tarbox, Katherine.,Katherine Tarbox,Katherine Tarbox

View Cybercrime and Society By Majid Yar
Cover of Cybercrime and Society by majid yar

Cybercrime and Society

By Majid Yar

View Cybersecurity Ethics By Mary Manjikian
Cover of Cybersecurity Ethics by mary manjikian

Cybersecurity Ethics

By Mary Manjikian

View Night Moves (Tom Clancy's Net Force, No. 3) By Tom Clancy,Netco Partners
Cover of Night Moves (Tom Clancy's Net Force, No. 3) by tom clancy,netco partners

Night Moves (Tom Clancy's Net Force, No. 3)

By Tom Clancy,Netco Partners

View Worm By Mark Bowden
Cover of Worm by mark bowden

Worm

By Mark Bowden

View NET FORCE HIDDEN AGENDAS By Tom Clancy,Steve R. Pieczenik
Cover of NET FORCE HIDDEN AGENDAS by tom clancy,steve r. pieczenik

NET FORCE HIDDEN AGENDAS

By Tom Clancy,Steve R. Pieczenik

View Principles of cybercrime By Jonathan Clough
Cover of Principles of cybercrime by jonathan clough

Principles of cybercrime

By Jonathan Clough

View Crypto By Steven Levy
Cover of Crypto by steven levy

Crypto

By Steven Levy

View A standard for auditing computer applications By William E. Perry

A standard for auditing computer applications

A standard for auditing computer applications

By William E. Perry