Skip to content
You are not logged in |Login  
     
Limit search to available items
Nearby Call numbers are:
Result page:  Prev Next  
Mark   Media Year
HV6773 .J33 2005eb : James, Lance,     
      Phishing exposed / Lance James ; foreward by Joe Stewart.   Bestseller
BestsellerE-book
2005
HV6773 .J33 2009eb : Jacobson, George V.     
      Cybersecurity, botnets, and cyberterrorism / George V. Jacobson.   Bestseller
BestsellerE-book
2009
HV6773 .J64 2013eb : Johnson, Mark,     
      Cyber crime, security and digital intelligence / Mark Johnson.   Bestseller
BestsellerE-book
2013
HV6773 .K69 2012 : Kowalski, Robin M.     
      Cyberbullying : bullying in the digital age / Robin M. Kowalski, Susan P. Limber, Patricia W. Agatsto Moore Stacks:Available   book
BookPrinted Material
2012
HV6773 .L53 2014eb : Libicki, Martin C.,     
      H4cker5 wanted : an examination of the cybersecurity labor market / Martin C. Libicki, David Senty, J   Bestseller
BestsellerE-book
2014
HV6773 .M38 2019 : Maurushat, Alana,     
      Ethical hacking / Alana Maurushat.   Bestseller
BestsellerE-book
2019
HV6773 .M44 2008eb : Mehan, Julie E.     
      CyberWar, CyberTerror, CyberCrime.   Bestseller
BestsellerE-book
2008
HV6773 .N38 2007eb : NATO Advanced Research Workshop on Responses to Cyber Terrorism     
      Responses to cyber terrorism / edited by Centre of Excellence Defence Against Terrorism, Ankara, Turk   Bestseller
BestsellerE-book
2008
HV6773 .N415 2008eb : NATO Advanced Research Workshop on Security Informatics and Terrorism - Patrolling the Web     
      Security informatics and terrorism : patrolling the Web : social and technical problems of detecting   Bestseller
BestsellerE-book
2008
HV6773 .N47 2001eb      
      Networks and netwars : the future of terror, crime, and militancy / edited by John Arquilla and David   Bestseller
BestsellerE-book
2001
HV6773 .N538 2010 : Nhan, Johnny,     
      Policing Cyberspace : a Structural and Cultural Analysis.   Bestseller
BestsellerE-book
2010
HV6773 .O743 2014      
      Organized chaos : reimagining the internet / edited by Marck Raymond and Gordon Smith.   Bestseller
BestsellerE-book
2016
HV6773 .P37 : Parker, Donn B.     
      Crime by computer / Donn B. Parker. Moore Stacks:Available   book
BookPrinted Material
1976
HV6773 .R64 2010eb : Rogers, Vanessa.     
      Cyberbullying : activities to help children and teens to stay safe in a texting, twittering, social n   Bestseller
BestsellerE-book
2010
HV6773 .S23 2006eb      
      Scams & swindles : phishing, spoofing, ID theft, Nigerian advance schemes, investment frauds, false s   Bestseller
BestsellerE-book
2006
HV6773 .S3547 2004 : Schell, Bernadette H.     
      Cybercrime : a reference handbook / Bernadette H. Schell and Clemens Martin. Moore Reference Room:Available   book
BookPrinted Material
2004
HV6773 .S355 2002 : Schell, Bernadette H.     
      The hacking of America : who's doing it, why, and how / Bernadette H. Schell, John L. Dodge, with Ste Moore Stacks:Available   book
BookPrinted Material
2002
HV6773 .S74 1993 : Sterling, Bruce.     
      The hacker crackdown : law and disorder on the electronic frontier / Bruce Sterling. Moore Stacks:Available, Moore Stacks (Suplee Collection):Available   book
BookPrinted Material
1992
HV6773 .V678 2018eb      
      Vortex of the web : potentials of the online environment / Martin A.M. Gansinger, Ayman Kole, (Eds.)   Bestseller
BestsellerE-book
2018
HV6773 .W423 2012    
      Web of deceit : misinformation and manipulation in the age of social media / edited by Anne P. Mintz. Moore Stacks:Available   book
BookPrinted Material
2012
      Web of deceit : misinformation and manipulation in the age of social media / edited by Anne P. Mintz.   Bestseller
BestsellerE-book
2012
HV6773.15.C92    
      Bullying and cyberbullying : prevalence, psychological impacts and intervention strategies / editors,   Bestseller
BestsellerE-book
2016
      Cyberbullying : causes, consequences, and coping strategies / Nicole L. Weber and William V. Pelfrey,   Bestseller
BestsellerE-book
2014
      A social-ecological approach to cyberbullying / editor, Michelle F. Wright, (Masaryk University, Inst   Bestseller
BestsellerE-book
2016
HV6773.15.C92 C57 2014 : Citron, Danielle Keats,     
      Hate crimes in cyberspace / Danielle Keats Citron. Moore Stacks:Available   book
BookPrinted Material
2014
HV6773.15.C92 .C57 2014eb : Citron, Danielle Keats,     
      Hate crimes in cyberspace / Danielle Keats Citron.   Bestseller
BestsellerE-book
2014
HV6773.15.C92 H58 2017 : Hitchcock, Jayne A.,     
      Cyberbullying and the wild, wild web : what everyone needs to know / J.A. Hitchcock. Moore Stacks:Available   book
BookPrinted Material
2017
HV6773.15.C94 R49 2012 : Reyns, Bradford W.,     
      The anti-social network : cyberstalking victimization among college students / Bradford W. Reyns.   Bestseller
BestsellerE-book
2012
HV6773.15.C97    
      Countering terrorist activities in cyberspace / edited by Zlatogor Minchev and Mitko Bogdanoski.   Bestseller
BestsellerE-book
2018
      Cyberwarfare : an introduction to information-age conflict / Isaac R. Porche.   Bestseller
BestsellerE-book
2020
      National critical infrastructure policy : background and select cybersecurity issues / Sheldon Yates,   Bestseller
BestsellerE-book
2016
      Resilience and hybrid threats : security and integrity for the digital world / edited by Igor Linkov,   Bestseller
BestsellerE-book
2019
2 additional entries    
HV6773.15.C97 C66 2018      
      Combating cyber threat / editor: Lieutenant General PK Singh, PVSM, AVSM (Retd.).   Bestseller
BestsellerE-book
2018
HV6773.15 .C97 C93 2012      
      Cyberspace and national security : threats, opportunities, and power in a virtual world / Derek S. Re   Bestseller
BestsellerE-book
2012
HV6773.15.C97 H34 2012eb online : Hagestad, William T.,     
      21st century Chinese cyberwarfare : an examination of the Chinese cyberthreat from fundamentals of Co   Bestseller
BestsellerE-book
2012
HV6773.15.C97 L53 2013 : Libicki, Martin C.,     
      Brandishing cyberattack capabilities / Martin C. Libicki.   Bestseller
BestsellerE-book
2013
HV6773.15.C97 R87 2014eb : Russell, Alison Lawlor,     
      Cyber blockades / Alison Lawlor Russell.   Bestseller
BestsellerE-book
2014
HV6773.15.C97 S36 2018 : Sanger, David E.,     
      The perfect weapon : war, sabotage, and fear in the cyber age / David E. Sanger. Moore Stacks:Available   book
BookPrinted Material
2018
HV6773.15.C97 S36 2019eb : Sanger, David E.,     
      The perfect weapon : war, sabotage, and fear in the cyber age / David E. Sanger.   Bestseller
BestsellerE-book
2018
HV6773.15.C97 V35 2018eb : Valeriano, Brandon,     
      Cyber strategy : the evolving character of power and coercion / Brandon Valeriano, Benjamin Jensen an   Bestseller
BestsellerE-book
2018
HV6773.15.O58 U53 2012      
      Understanding and preventing online sexual exploitation of children / edited by Ethel Quayle and Kurt Moore Stacks:Available   book
BookPrinted Material
2012
HV6773.2 .B55 1990 : BloomBecker, Buck.     
      Spectacular computer crimes : what they are and how they cost American business half a billion dollar Moore Stacks:Available   book
BookPrinted Material
1990
HV6773.2 .C585 2019eb : Clarke, Richard A.     
      The fifth domain : defending our country, our companies, and ourselves in the age of cyber threats /   Bestseller
BestsellerE-book
2019
HV6773.2 .F74 1997 : Freedman, David H.,     
      At large : the strange case of the world's biggest Internet invasion / David H. Freedman, Charles C. Moore Stacks:Available   book
BookPrinted Material
1997
HV6773.2 .H36 2007 : Hansen, Chris,     
      To catch a predator : protecting your kids from online enemies already in your home / Chris Hansen. Moore Stacks:Available   book
BookPrinted Material
2007
HV6773.2 .K53 2010eb : Knake, Robert K.     
      Internet governance in an age of cyber insecurity / Robert K. Knake.   Bestseller
BestsellerE-book
2010
HV6773.2 .S48 1996 : Shimomura, Tsutomu,     
      Take-down : the pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw--by the m Moore Stacks:Available   book
BookPrinted Material
1996
HV6773.2 .W55 2009eb : Wilson, Clay.     
      Computer attack and cyberterrorism / Clay Wilson.   Bestseller
BestsellerE-book
2009
HV6773.23.N5 N48 2000 : New Jersey State Commission of Investigation.     
      Computer crime : a joint report / State of New Jersey Commission of Investigation, Leslie Z. Celentan   book
BookPrinted Material
2000
HV6773.25.N5 S53 1995 : Slatalla, Michelle.     
      Masters of deception : the gang that ruled cyberspace / Michelle Slatalla and Joshua Quittner. Moore Stacks:Available   book
BookPrinted Material
1995
HV6773.3.I4 H35 2016eb : Halder, Debarati,     
      Cyber crimes against women in India / Debarati Halder & K. Jaishankar.   Bestseller
BestsellerE-book
2016
HV6773.3.N4 V44 2016 : Veenstra, Sander,     
      Cybercrime among companies : research into cybercrime victimisation among small- and medium-sized ent   Bestseller
BestsellerE-book
2016
HV6773.3.S33 : Āl Jār Allāh, ʻAbd al-ʻAzīz ibn Gharam Allāh,     
      Jarāʼim al-intirnit wa-ʻuqūbātuhā : wafq niẓām mukāfaḥat jarāʼim al-al-maʻlūmātīyah al-Saʻūdī : wa-ya   Bestseller
BestsellerE-book
2017
HV6773.5      
      Responding to hate crime : the case for connecting policy and research / edited by Neil Chakraborti a   Bestseller
BestsellerE-book
2014
HV6773.5 .H34 2005 : Hall, Nathan.     
      Hate crime / Nathan Hall. Moore Stacks:Available   book
BookPrinted Material
2005
HV6773.5 .I33 2008eb : Iganski, Paul.     
      Hate crime and the city / Paul Iganski.   Bestseller
BestsellerE-book
2008
Resources
More Information
Result page:  Prev Next