Search Results: ''

Search

×
×
×
×
2 results for ""
Information Systems, Computer Crime & Criminal Justice By Edward M. Roche, George Van Nostrand
Paperback: $82.88
Ships in 3-5 business days.
CALIFORNIA Eighth Student Edition. Extensive coverage of computer-related crime and Internet fraud. Includes Model Computer Crime Code and relevant Federal Statutes. Cyber-crime, Child Pornography,... More > Online Gambling, Slave Trade, Nigerian e-Mail Scams, Identity Theft, Bank Fraud, Denial-of-Service Attacks, Hacking, Embezzlement, Information Terrorism, Industrial Espionage, Solicitation, Piracy, Fake Credit Cards, Counterfeit Drugs, Online Voyuerism, Pfishing, Eavesdropping, Spam, Unprotected Speech, Hate Crimes, Pretexing, Spyware, Spoofing, Encryption, Computer Forensics, Homicide-by-Computer, Firewalls, Cyber Search-and-Seizure, Surveillance, Counterintelligence, Disaster Recovery, Bait-and-Switch, Social Networking, Child Predators, Massive Multiplayer Online Games, Virtual Reality, Invasion of Privacy, Lottery Scams, Auctions, Exploitation of Elderly Persons, Hate Groups, Spies, Criminals, Gangsters, Promoters, Confidence Men, Pyramid Schemes, Tax Evasion, Portals, "Winning" Lotteries, and P2P.< Less
Information Systems, Computer Crime & Criminal Justice By Edward M. Roche, George Van Nostrand
Paperback: $47.95
Ships in 3-5 business days.
PENNSYLVANIA Eighth Student Edition. Computer-related crime and Internet fraud. Includes Model Computer Crime Code and relevant Federal Statutes. Cyber-crime, Child Pornography, Online Gambling,... More > Slave Trade, e-Mail Scams, Identity Theft, Bank Fraud, Denial-of-Service Attacks, Hacking, Embezzlement, Terrorism, Solicitation, Piracy, Fake Credit Cards, Counterfeit Drugs, Online Voyuerism, Pfishing, Eavesdropping, Spam, Unprotected Speech, Hate Crimes, Pretexing, Spyware, Spoofing, Encryption, Computer Forensics, Homicide-by-Computer, Firewalls, Cyber Search-and-Seizure, Surveillance, Counterintelligence, Disaster Recovery, Bait-and-Switch, Social Networking, Child Predators, Massive Multiplayer Online Games, Virtual Reality, Invasion of Privacy, Lottery Scams, Auctions, Exploitation of Elderly Persons, Hate Groups, Spies, Criminals, Gangsters, Promoters, Confidence Men, Pyramid Schemes, Tax Evasion, Portals, "Winning" Lotteries, and P2P. New material on Augmented Reality, Virtual Worlds, and Cyber-Espionage.< Less