Books on the topic 'Digital prevention'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Digital prevention.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Taylor, Robert W. Digital crime and digital terrorism. 2nd ed. Boston: Prentice Hall, 2011.
Find full textZhu, Xingquan, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish, and Jeremy Kayne. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56793-8.
Full textZhu, Xingquan. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017.
Find full textLi, Chang-Tsun. Emerging digital forensics applications for crime detection, prevention, and security. Hershey, PA: Information Science Reference, 2013.
Find full textAlexander, Heidi S., and Smith Julian W. Data security in the digital age. Boston, MA: MCLE New England, 2015.
Find full textBrandstätter, Gerhard. Projective photogrammetry: The successful prevention of a further development. Graz: Graz University of Technology, Institute of Applied Geodesy, 2000.
Find full textCenter, Lewis Research, ed. Determination of shed ice particle size using high speed digital imaging. Cleveland, Ohio: NASA Lewis Research Center, 1996.
Find full textSmołka, Bogdan. Nonlinear techniques of noise reduction in digital color images. Gliwice: Wydawn. Politechniki Śląskiej, 2004.
Find full textMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Find full textMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Find full textMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Find full textMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Find full textSchperberg, Robert. Cybercrime: Incident response and digital forensics. Rolling Meadows, IL: Information Systems Audit and Control Association, 2005.
Find full textChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Find full textChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Find full textG, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Find full textG, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Find full textRich, Thomas F. The use of computerized mapping in crime control and prevention programs. [Washington, D.C.]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1995.
Find full textP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology., and Sandia National Laboratories, eds. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Find full textP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology., and Sandia National Laboratories, eds. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Find full textBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Boston: Addison-Wesley, 2005.
Find full textKeating, Gregory. Navigating legal issues related to cyberbullying: An immediate look at the legal and social impact of digital harassment. Boston, Mass.]: Aspatore Books, 2011.
Find full textNational Cable & Telecommunications Association. Office of Cable Signal Theft. White paper 2004: Legal tools to address broadband theft in the digital age. [United States]: NCTA/National Cable & Telecommunications Association, Office of Cable Signal Theft, 2004.
Find full textInternational Workshop on Cybercrime and Digital Forensics (2005 Bangkok, Thailand). Cybercrime prevention and digital forensics: Report of the international workshop : Bangkok, Thailand, 19-22 April 2005 : an ancillary meeting of the 11th UN Crime Congress on Crime Prevention and Criminal Justice. [Tokyo]: ADB Institute, 2005.
Find full textAhearn, Frank M. How to disappear: Erase your digital footprint, leave false trails, and vanish without a trace. Guilford, Conn: Lyons Press, 2010.
Find full textZhu, Xingquan, Haicheng Tao, Kristopher Kalish, Jie Cao, and Zhiang Wu. Fraud Prevention in Online Digital Advertising. Springer London, Limited, 2017.
Find full textTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper, and John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Find full textTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper, and John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Find full textDigital crime and digital terrorism. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Find full textMcKinnon, David, Nina Lander Svendsen, Bjørn Bauer, John Baxter, Leonidas Milios, and Pauliina Saari. Measuring waste prevention and reuse: digital opportunities. Nordic Council of Ministers, 2022. http://dx.doi.org/10.6027/temanord2022-536.
Full textLindeen, Mary. Digital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Find full textSeitz, Juergen. Digital Watermarking for Digital Media. Information Science Publishing, 2005.
Find full textSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2018.
Find full textSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2019.
Find full textAnanda, Ph d. Mitra. Digital Security: Cyber Terror and Cyber Security (The Digital World). Chelsea House Pub (L), 2008.
Find full textEvaluation of a copy prevention method for digital audio tape systems. [Washington, D.C.]: The Bureau, 1988.
Find full textMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Find full textMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Find full textCombating Violent Extremism and Radicalization in the Digital Era. IGI Global, 2016.
Find full textArnett, David W. Digital clocks based upon dual side band suppressed carrier modulation. 1998.
Find full textOmar, Marwan, and Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.
Find full text