Libros sobre el tema "Digital prevention"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Digital prevention".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Taylor, Robert W. Digital crime and digital terrorism. 2a ed. Boston: Prentice Hall, 2011.
Buscar texto completoZhu, Xingquan, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish y Jeremy Kayne. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56793-8.
Texto completoZhu, Xingquan. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017.
Buscar texto completoLi, Chang-Tsun. Emerging digital forensics applications for crime detection, prevention, and security. Hershey, PA: Information Science Reference, 2013.
Buscar texto completoAlexander, Heidi S. y Smith Julian W. Data security in the digital age. Boston, MA: MCLE New England, 2015.
Buscar texto completoBrandstätter, Gerhard. Projective photogrammetry: The successful prevention of a further development. Graz: Graz University of Technology, Institute of Applied Geodesy, 2000.
Buscar texto completoCenter, Lewis Research, ed. Determination of shed ice particle size using high speed digital imaging. Cleveland, Ohio: NASA Lewis Research Center, 1996.
Buscar texto completoSmołka, Bogdan. Nonlinear techniques of noise reduction in digital color images. Gliwice: Wydawn. Politechniki Śląskiej, 2004.
Buscar texto completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Buscar texto completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Buscar texto completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Buscar texto completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Buscar texto completoSchperberg, Robert. Cybercrime: Incident response and digital forensics. Rolling Meadows, IL: Information Systems Audit and Control Association, 2005.
Buscar texto completoChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Buscar texto completoChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Buscar texto completoG, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Buscar texto completoG, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Buscar texto completoRich, Thomas F. The use of computerized mapping in crime control and prevention programs. [Washington, D.C.]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1995.
Buscar texto completoP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology. y Sandia National Laboratories, eds. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Buscar texto completoP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology. y Sandia National Laboratories, eds. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Buscar texto completoBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Boston: Addison-Wesley, 2005.
Buscar texto completoKeating, Gregory. Navigating legal issues related to cyberbullying: An immediate look at the legal and social impact of digital harassment. Boston, Mass.]: Aspatore Books, 2011.
Buscar texto completoNational Cable & Telecommunications Association. Office of Cable Signal Theft. White paper 2004: Legal tools to address broadband theft in the digital age. [United States]: NCTA/National Cable & Telecommunications Association, Office of Cable Signal Theft, 2004.
Buscar texto completoInternational Workshop on Cybercrime and Digital Forensics (2005 Bangkok, Thailand). Cybercrime prevention and digital forensics: Report of the international workshop : Bangkok, Thailand, 19-22 April 2005 : an ancillary meeting of the 11th UN Crime Congress on Crime Prevention and Criminal Justice. [Tokyo]: ADB Institute, 2005.
Buscar texto completoAhearn, Frank M. How to disappear: Erase your digital footprint, leave false trails, and vanish without a trace. Guilford, Conn: Lyons Press, 2010.
Buscar texto completoZhu, Xingquan, Haicheng Tao, Kristopher Kalish, Jie Cao y Zhiang Wu. Fraud Prevention in Online Digital Advertising. Springer London, Limited, 2017.
Buscar texto completoTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper y John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Buscar texto completoTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper y John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Buscar texto completoDigital crime and digital terrorism. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Buscar texto completoMcKinnon, David, Nina Lander Svendsen, Bjørn Bauer, John Baxter, Leonidas Milios y Pauliina Saari. Measuring waste prevention and reuse: digital opportunities. Nordic Council of Ministers, 2022. http://dx.doi.org/10.6027/temanord2022-536.
Texto completoDigital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Buscar texto completoDigital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Buscar texto completoLindeen, Mary. Digital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Buscar texto completoSeitz, Juergen. Digital Watermarking for Digital Media. Information Science Publishing, 2005.
Buscar texto completoDigital Watermarking for Digital Media. Information Science Publishing, 2005.
Buscar texto completoDigital Watermarking For Digital Media. Information Science Publishing, 2005.
Buscar texto completoSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2018.
Buscar texto completoSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2019.
Buscar texto completoAnanda, Ph d. Mitra. Digital Security: Cyber Terror and Cyber Security (The Digital World). Chelsea House Pub (L), 2008.
Buscar texto completoEvaluation of a copy prevention method for digital audio tape systems. [Washington, D.C.]: The Bureau, 1988.
Buscar texto completoMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Buscar texto completoMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Buscar texto completoHacked, attacked & abused: Digital crime exposed. London: Kogan Page, 2002.
Buscar texto completoCombating Violent Extremism and Radicalization in the Digital Era. IGI Global, 2016.
Buscar texto completoArnett, David W. Digital clocks based upon dual side band suppressed carrier modulation. 1998.
Buscar texto completoOmar, Marwan y Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.
Buscar texto completo