Search ResultsElectronic Resources
Limit Search Results
Author
Material Type
Subject
Library
1565 Results Found Subscribe to search results
000000000000DEFAULT
Print
Select a list
Make this your default list.
The following items were successfully added.
    There was an error while adding the following items. Please try again.
      by 
      Alder, Raven.
      Format: 
      Excerpt: 
      used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the
      by 
      Keppel, Robert D.
      Format: 
      Excerpt: 
      crime assessment profiling reveals that psychology * Why psychological profiles fail * How serial killer
      by 
      Genov, Nikolaĭ.
      Format: 
      Excerpt: 
      Integration and Marginalization -- 16.1 Ethnic Minorities 440 -- 16.2 Crime and Punishment 448 -- 16.3
      by 
      Carroll, John M. (John Millar), 1925-
      Format: 
      Excerpt: 
      SECURITY PROBLEMS; EDP SECURITY IN A NUTSHELL; Chapter 2. A Casebook of Computer Crime; CASE HISTORIES
      by 
      Al-Issa, Ihsan.
      Format: 
      Excerpt: 
      ; References; Chapter 11. Gender and Crime
      by 
      Plouffe-Malette, Kristine.
      Format: 
      Excerpt: 
      travail sur la traite des personnes de l'Office des Nations Unies contre la drogue et le crime -- Section
      by 
      Turner, Jonathan E., 1969-
      Format: 
      Excerpt: 
      -- ch. 9 Investigating Money Movement -- Money Laundering Is Now Transnational Organized Crime
      by 
      Spedding, Linda S., 1952-
      Format: 
      Excerpt: 
      , fraud, risk etc. and economic crime. These new areas can be set against the background issue of how much
      by 
      Long, Johnny.
      Format: 
      Excerpt: 
      computer crime and security-related topics. His unforgettable presentations are filled with three decades
      by 
      Leeuw, Karl de.
      Format: 
      Excerpt: 
      standards, viruses and worms on the Internet, computer transparency and free software, computer crime
      by 
      Contos, Brian T.
      Format: 
      Excerpt: 
      Part I: Background on Cyber Crime, Insider Threats, and ESM -- Chapter One: Cyber Crime and Cyber
      by 
      Jensen, Arthur Robert.
      Format: 
      Excerpt: 
      / Phillip L. Ackerman and David F. Lohman -- 15. g, Jobs and Life / Linda S. Gottfredson -- 16. Crime