Suggested Topics within your search.
Suggested Topics within your search.
- Computer crimes 105
- Prevention 43
- Computer security 32
- Security measures 28
- Law and legislation 21
- Computers 17
- Internet 16
- Access control 15
- Privacy, Right of 14
- Cyberterrorism 11
- Computer networks 9
- Data protection 8
- Hackers 8
- Consumer protection 6
- Identity theft 6
- Computer viruses 5
- Electronic data processing departments 5
- Electronic government information 5
- Government policy 5
- Investigation 5
- Corrupt practices 4
- Disclosure of information 4
- Internet and children 4
- Internet fraud 4
- Small business 4
- Commercial crimes 3
- Criminal justice, Administration of 3
- Criminal provisions 3
- Database security 3
- Information superhighway 3
-
1
Dedicated computer crime units /
Published 1989Subjects: “…Computer crimes United States Investigation.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
2
Investigating computer-related crime /
Published 2000Subjects: “…Computer crimes United States Investigation.…”
Book -
3
Electronic crime needs assessment for state and local law enforcement /
Published 2001Subjects: “…Computer crimes United States. http://id.loc.gov/authorities/subjects/sh2008117724.…”
Connect to online resource
Government Document Book -
4
The Computer Abuse Amendments Act of 1990 : hearing before the Subcommittee on Technology and the Law of the Committee on the Judiciary, United States Senate, One Hundred First Con...
Published 1991Subjects: “…Computer crimes United States Prevention. http://id.loc.gov/authorities/subjects/sh2009118976.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
5
Computer fraud legislation : hearing before the Subcommittee on Criminal Law of the Committee on the Judiciary, United States Senate, Ninety-ninth Congress, first session, on S. 44...
Published 1986Subjects: “…Computer crimes United States Prevention. http://id.loc.gov/authorities/subjects/sh2009118976.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
6
Introduction to cyber crime /
Published 2000Subjects: “…Computer crimes United States. http://id.loc.gov/authorities/subjects/sh2008117724.…”
Government Document Book -
7
-
8
Computer crime and security /
Published 1994Subjects: “…Computer crimes United States Bibliography.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
9
Crimes against business : a management perspective : proceedings of seminars held in New York, New York, September 14, 1976, /
Published 1977Subjects: “…Computer crimes United States Congresses.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
10
State computer crime statutes /
Published 1991Subjects: “…Computer crimes United States. http://id.loc.gov/authorities/subjects/sh2008117724.…”
Government Document Book -
11
At large : the strange case of the world's biggest Internet invasion /
Published 1997Subjects: “…Computer crimes United States Case studies.…”
Book -
12
Investigations involving the Internet and computer networks
Published 2007Subjects: “…Computer crimes United States Handbooks, manuals, etc.…”
Online Access
Online Access
Government Document Electronic eBook -
13
Cybercrime against businesses, 2005 /
Published 2008Subjects: “…Computer crimes United States Statistics.…”
Government Document Book -
14
-
15
Computer crime : criminal justice resource manual /
Published 1989Subjects: “…Computer crimes United States. http://id.loc.gov/authorities/subjects/sh2008117724.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
16
Electronic Communications Privacy Act of 1986 : report (to accompany S. 2575)
Government Document Book -
17
Computer crime : hearing before the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary, House of Representatives, Ninety-eighth Congress, first sessi...
Published 1984Subjects: “…Computer crimes United States. http://id.loc.gov/authorities/subjects/sh2008117724.…”
Search for the full-text version of this title in HathiTrust
Government Document Book -
18
Takedown : the pursuit and capture of Kevin Mitnick, America's most wanted computer outlaw--by the man who did it /
Published 1996Subjects:Book -
19
Information systems agencies overlook security controls during development : report to the Chairman, Committee on Science, Space, and Technology, House of Representatives /
Published 1988Subjects:Government Document Microfilm Book -
20
Information systems agencies overlook security controls during development : report to the Chairman, Committee on Science, Space, and Technology, House of Representatives /
Published 1988Subjects:Government Document Microfilm Book