1

How real a threat does computer crime represent?

Year:
1996
Language:
english
File:
PDF, 618 KB
english, 1996
3

Defending large networks — the key threats

Year:
1994
Language:
english
File:
PDF, 421 KB
english, 1994
5

What Is Shockwave Therapy?

Year:
2020
Language:
english
File:
PDF, 363 KB
english, 2020
6

Dial thru' fraud the ramifications for a business

Year:
1995
Language:
english
File:
PDF, 118 KB
english, 1995
7

Where have all the hackers gone?: Part 5 — Conclusions

Year:
1997
Language:
english
File:
PDF, 260 KB
english, 1997
8

Where have all the hackers gone?: Part 3 — Motivation and deterrence

Year:
1997
Language:
english
File:
PDF, 765 KB
english, 1997
11

Where have all the hackers gone?: Part 4 — Legislation

Year:
1997
Language:
english
File:
PDF, 627 KB
english, 1997
12

Computer-related fraud and its evolution within telephony

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997
13

PBX fraud, the final solution — Detection, deterrent, countermeasures

Year:
1997
Language:
english
File:
PDF, 98 KB
english, 1997
14

Where have all the hackers gone?: Part 6 — Appendices and bibliography

Year:
1997
Language:
english
File:
PDF, 863 KB
english, 1997
15

Hacking: Motivation and deterrence, part I

Year:
1998
Language:
english
File:
PDF, 382 KB
english, 1998
16

Hacking: Motivation and deterrence, part II

Year:
1998
Language:
english
File:
PDF, 263 KB
english, 1998
19

Doctoral researcher skill development: learning through doing

Year:
2013
Language:
english
File:
PDF, 437 KB
english, 2013