Livros sobre o tema "Digital prevention"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores livros para estudos sobre o assunto "Digital prevention".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.
Taylor, Robert W. Digital crime and digital terrorism. 2a ed. Boston: Prentice Hall, 2011.
Encontre o texto completo da fonteZhu, Xingquan, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish e Jeremy Kayne. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-56793-8.
Texto completo da fonteZhu, Xingquan. Fraud Prevention in Online Digital Advertising. Cham: Springer International Publishing, 2017.
Encontre o texto completo da fonteLi, Chang-Tsun. Emerging digital forensics applications for crime detection, prevention, and security. Hershey, PA: Information Science Reference, 2013.
Encontre o texto completo da fonteAlexander, Heidi S., e Smith Julian W. Data security in the digital age. Boston, MA: MCLE New England, 2015.
Encontre o texto completo da fonteBrandstätter, Gerhard. Projective photogrammetry: The successful prevention of a further development. Graz: Graz University of Technology, Institute of Applied Geodesy, 2000.
Encontre o texto completo da fonteCenter, Lewis Research, ed. Determination of shed ice particle size using high speed digital imaging. Cleveland, Ohio: NASA Lewis Research Center, 1996.
Encontre o texto completo da fonteSmołka, Bogdan. Nonlinear techniques of noise reduction in digital color images. Gliwice: Wydawn. Politechniki Śląskiej, 2004.
Encontre o texto completo da fonteMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Encontre o texto completo da fonteMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Encontre o texto completo da fonteMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Encontre o texto completo da fonteMitra, Ananda. Digital security: Cyber terror and cyber security. New York: Chelsea House, 2010.
Encontre o texto completo da fonteSchperberg, Robert. Cybercrime: Incident response and digital forensics. Rolling Meadows, IL: Information Systems Audit and Control Association, 2005.
Encontre o texto completo da fonteChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteChang-Tsun, Li, ed. Handbook of research on computational forensics, digital crime, and investigation: Methods and solutions. Hershey, PA: Information Science Reference, 2010.
Encontre o texto completo da fonteG, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Encontre o texto completo da fonteG, Massingale Joseph, ed. Digital surveillance: Laws, security and related issues. New York: Nova Science Publishers, 2009.
Encontre o texto completo da fonteRich, Thomas F. The use of computerized mapping in crime control and prevention programs. [Washington, D.C.]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 1995.
Encontre o texto completo da fonteP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology. e Sandia National Laboratories, eds. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Encontre o texto completo da fonteP, Nowlen S., Anderson D. J. 1935-, U.S. Nuclear Regulatory Commission. Office of Nuclear Regulatory Research. Division of Systems Technology. e Sandia National Laboratories, eds. Circuit bridging of components by smoke. Washington, DC: Division of Systems Technology, Office of Nuclear Regulatory Research, U.S. Nuclear Regulatory Commission, 1996.
Encontre o texto completo da fonteBranigan, Steven. High-tech crimes revealed: Cyberwar stories from the digital front. Boston: Addison-Wesley, 2005.
Encontre o texto completo da fonteKeating, Gregory. Navigating legal issues related to cyberbullying: An immediate look at the legal and social impact of digital harassment. Boston, Mass.]: Aspatore Books, 2011.
Encontre o texto completo da fonteNational Cable & Telecommunications Association. Office of Cable Signal Theft. White paper 2004: Legal tools to address broadband theft in the digital age. [United States]: NCTA/National Cable & Telecommunications Association, Office of Cable Signal Theft, 2004.
Encontre o texto completo da fonteInternational Workshop on Cybercrime and Digital Forensics (2005 Bangkok, Thailand). Cybercrime prevention and digital forensics: Report of the international workshop : Bangkok, Thailand, 19-22 April 2005 : an ancillary meeting of the 11th UN Crime Congress on Crime Prevention and Criminal Justice. [Tokyo]: ADB Institute, 2005.
Encontre o texto completo da fonteAhearn, Frank M. How to disappear: Erase your digital footprint, leave false trails, and vanish without a trace. Guilford, Conn: Lyons Press, 2010.
Encontre o texto completo da fonteBryant, Robin. Policing Digital Crime. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteZhu, Xingquan, Haicheng Tao, Kristopher Kalish, Jie Cao e Zhiang Wu. Fraud Prevention in Online Digital Advertising. Springer London, Limited, 2017.
Encontre o texto completo da fonteTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper e John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Encontre o texto completo da fonteTaylor, Robert W., Eric J. Fritsch, Tory J. Caeti, Kall Loper e John Liederbach. Digital Crime and Digital Terrorism. Prentice Hall, 2005.
Encontre o texto completo da fonteDigital crime and digital terrorism. Upper Saddle River, NJ: Pearson/Prentice Hall, 2005.
Encontre o texto completo da fonteMcKinnon, David, Nina Lander Svendsen, Bjørn Bauer, John Baxter, Leonidas Milios e Pauliina Saari. Measuring waste prevention and reuse: digital opportunities. Nordic Council of Ministers, 2022. http://dx.doi.org/10.6027/temanord2022-536.
Texto completo da fonteDigital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Encontre o texto completo da fonteDigital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Encontre o texto completo da fonteLindeen, Mary. Digital Safety Smarts: Preventing Cyberbullying. Lerner Publishing Group, 2016.
Encontre o texto completo da fonteSeitz, Juergen. Digital Watermarking for Digital Media. Information Science Publishing, 2005.
Encontre o texto completo da fonteDigital Watermarking for Digital Media. Information Science Publishing, 2005.
Encontre o texto completo da fonteDigital Watermarking For Digital Media. Information Science Publishing, 2005.
Encontre o texto completo da fonteBryant, Robin. Policing Digital Crime. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteBryant, Robin. Policing Digital Crime. Taylor & Francis Group, 2016.
Encontre o texto completo da fonteSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2018.
Encontre o texto completo da fonteSalmani, Hassan. Trusted Digital Circuits: Hardware Trojan Vulnerabilities, Prevention and Detection. Springer, 2019.
Encontre o texto completo da fonteAnanda, Ph d. Mitra. Digital Security: Cyber Terror and Cyber Security (The Digital World). Chelsea House Pub (L), 2008.
Encontre o texto completo da fonteEvaluation of a copy prevention method for digital audio tape systems. [Washington, D.C.]: The Bureau, 1988.
Encontre o texto completo da fonteMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Encontre o texto completo da fonteMcKee, Rosie. Computer Dos and Dont's: Digital Citizenship. Rosen Publishing Group, 2017.
Encontre o texto completo da fonteHacked, attacked & abused: Digital crime exposed. London: Kogan Page, 2002.
Encontre o texto completo da fonteCombating Violent Extremism and Radicalization in the Digital Era. IGI Global, 2016.
Encontre o texto completo da fonteArnett, David W. Digital clocks based upon dual side band suppressed carrier modulation. 1998.
Encontre o texto completo da fonteOmar, Marwan, e Maurice Dawson. New Threats and Countermeasures in Digital Crime and Cyber Terrorism. IGI Global, 2015.
Encontre o texto completo da fonte