Corporate hacking and technology-driven crime social dynamics and implications

"This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher.

Bibliographic Details
Other Authors: Holt, Thomas J. 1978-, Schell, Bernadette H 1952-
Format: Book
Published: Hershey, PA Business Science Reference c2011
Subjects:
Online Access:View fulltext via EzAccess
LEADER 01273cam a2200289 a 4500
001 25661
003 DLC
005 20140710143608.0
008 100422s2011 pau b 001 0 eng
010 # # |a 2010016447 
020 # # |a 9781616928056 (hbk.) 
020 # # |a 9781616928070 (ebook) 
040 # # |a DLC  |c DLC  |d DLC 
042 # # |a pcc 
050 # # |a HV6773  |b .C674 2011 
082 # # |a 364.16/8  |2 22 
245 # # |a Corporate hacking and technology-driven crime  |b social dynamics and implications  |c Thomas J. Holt and Bernadette H. Schell, [editors] 
260 # # |a Hershey, PA  |b Business Science Reference  |c c2011 
300 # # |a xvi, 198 p.  |b ill.  |c 29 cm 
504 # # |a Includes bibliographical references (p. 266-289) and index 
520 # # |a "This book addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions"--Provided by publisher. 
650 # # |a Computer crime 
650 # # |a Hackers 
700 # # |a Holt, Thomas J.  |d 1978- 
700 # # |a Schell, Bernadette H  |d 1952-  |q (Bernadette Hlubik) 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-61692-805-6  |z View fulltext via EzAccess