Libri sul tema "Digital prevention"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 libri per l'attività di ricerca sul tema "Digital prevention".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi i libri di molte aree scientifiche e compila una bibliografia corretta.
Taylor, Robert W. Digital crime and digital terrorism. 2a ed. Boston: Prentice Hall, 2011.
Cerca il testo completoZhu, Xingquan, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish e Jeremy Kayne. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56793-8.
Testo completoZhu, Xingquan. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017.
Cerca il testo completoLi, Chang-Tsun. Emerging digital forensics applications for crime detection, prevention, and security. Hershey, PA: Information Science Reference, 2013.
Cerca il testo completoAlexander, Heidi S., e Smith Julian W. Data security in the digital age. Boston, MA: MCLE New England, 2015.
Cerca il testo completoBrandstätter, Gerhard. Projective photogrammetry: The successful prevention of a further development. Graz: Graz University of Technology, Institute of Applied Geodesy, 2000.
Cerca il testo completoCenter, Lewis Research, a cura di. Determination of shed ice particle size using high speed digital imaging. Cleveland, Ohio: NASA Lewis Research Center, 1996.
Cerca il testo completoSmołka, Bogdan. Nonlinear techniques of noise reduction in digital color images. Gliwice: Wydawn. Politechniki Śląskiej, 2004.
Cerca il testo completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Cerca il testo completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Cerca il testo completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Cerca il testo completoMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Cerca il testo completoSchperberg, Robert. Cybercrime: Incident response and digital forensics. Rolling Meadows, IL: Information Systems Audit and Control Association, 2005.
Cerca il testo completoChang-Tsun, Li, a cura di. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Cerca il testo completoChang-Tsun, Li, a cura di. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Cerca il testo completoG, Massingale Joseph, a cura di. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Cerca il testo completoG, Massingale Joseph, a cura di. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Cerca il testo completoRich, Thomas F. The use of computerized mapping in crime control and prevention programs. [Washington, D.C.]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1995.
Cerca il testo completoP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology. e Sandia National Laboratories, a cura di. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Cerca il testo completoP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology. e Sandia National Laboratories, a cura di. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Cerca il testo completoBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Boston: Addison-Wesley, 2005.
Cerca il testo completoKeating, Gregory. Navigating legal issues related to cyberbullying: An immediate look at the legal and social impact of digital harassment. Boston, Mass.]: Aspatore Books, 2011.
Cerca il testo completoNational Cable & Telecommunications Association. Office of Cable Signal Theft. White paper 2004: Legal tools to address broadband theft in the digital age. [United States]: NCTA/National Cable & Telecommunications Association, Office of Cable Signal Theft, 2004.
Cerca il testo completoInternational Workshop on Cybercrime and Digital Forensics (2005 Bangkok, Thailand). Cybercrime prevention and digital forensics: Report of the international workshop : Bangkok, Thailand, 19-22 April 2005 : an ancillary meeting of the 11th UN Crime Congress on Crime Prevention and Criminal Justice. [Tokyo]: ADB Institute, 2005.
Cerca il testo completoAhearn, Frank M. How to disappear: Erase your digital footprint, leave false trails, and vanish without a trace. Guilford, Conn: Lyons Press, 2010.
Cerca il testo completoZhu, Xingquan, Haicheng Tao, Kristopher Kalish, Jie Cao e Zhiang Wu. Fraud Prevention in Online Digital Advertising. Springer London, Limited, 2017.
Cerca il testo completoTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper e John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Cerca il testo completoTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper e John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Cerca il testo completoDigital crime and digital terrorism. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Cerca il testo completoMcKinnon, David, Nina Lander Svendsen, Bjørn Bauer, John Baxter, Leonidas Milios e Pauliina Saari. Measuring waste prevention and reuse: digital opportunities. Nordic Council of Ministers, 2022. http://dx.doi.org/10.6027/temanord2022-536.
Testo completoDigital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Cerca il testo completoDigital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Cerca il testo completoLindeen, Mary. Digital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Cerca il testo completoSeitz, Juergen. Digital Watermarking for Digital Media. Information Science Publishing, 2005.
Cerca il testo completoDigital Watermarking for Digital Media. Information Science Publishing, 2005.
Cerca il testo completoDigital Watermarking For Digital Media. Information Science Publishing, 2005.
Cerca il testo completoSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2018.
Cerca il testo completoSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2019.
Cerca il testo completoAnanda, Ph d. Mitra. Digital Security: Cyber Terror and Cyber Security (The Digital World). Chelsea House Pub (L), 2008.
Cerca il testo completoEvaluation of a copy prevention method for digital audio tape systems. [Washington, D.C.]: The Bureau, 1988.
Cerca il testo completoMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Cerca il testo completoMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Cerca il testo completoHacked, attacked & abused: Digital crime exposed. London: Kogan Page, 2002.
Cerca il testo completoCombating Violent Extremism and Radicalization in the Digital Era. IGI Global, 2016.
Cerca il testo completoArnett, David W. Digital clocks based upon dual side band suppressed carrier modulation. 1998.
Cerca il testo completoOmar, Marwan, e Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.
Cerca il testo completo