|
|
|
|
LEADER |
01273cam a2200289 a 4500 |
001 |
25661 |
003 |
DLC |
005 |
20140710143608.0 |
008 |
100422s2011 pau b 001 0 eng |
010 |
# |
# |
|a 2010016447
|
020 |
# |
# |
|a 9781616928056 (hbk.)
|
020 |
# |
# |
|a 9781616928070 (ebook)
|
040 |
# |
# |
|a DLC
|c DLC
|d DLC
|
042 |
# |
# |
|a pcc
|
050 |
# |
# |
|a HV6773
|b .C674 2011
|
082 |
# |
# |
|a 364.16/8
|2 22
|
245 |
# |
# |
|a Corporate hacking and technology-driven crime
|b social dynamics and implications
|c Thomas J. Holt and Bernadette H. Schell, [editors]
|
260 |
# |
# |
|a Hershey, PA
|b Business Science Reference
|c c2011
|
300 |
# |
# |
|a xvi, 198 p.
|b ill.
|c 29 cm
|
504 |
# |
# |
|a Includes bibliographical references (p. 266-289) and index
|
520 |
# |
# |
|a "This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher.
|
650 |
# |
# |
|a Computer crime
|
650 |
# |
# |
|a Hackers
|
700 |
# |
# |
|a Holt, Thomas J.
|d 1978-
|
700 |
# |
# |
|a Schell, Bernadette H
|d 1952-
|q (Bernadette Hlubik)
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-805-6
|z View fulltext via EzAccess
|