Cybercrime

data trails do tell tales

"Read about this history of cybercrime, and learn about the different types of scams--from phising to spam to hacking--that take place on the internet"--Provided by publisher.

Enslow Pub., Inc.
2012
9780766036680
book

Holdings

hidmidmiidnidwidlocation_codelocationbarcodecallnumdeweycreatedupdated
363893418948822592747452088DANH146DANH90060364.16 LAT364.1615774597521709567815
416588423819722632747452088GENH224GENH06798364.1 LAT364.115774597521709567815
1314794498015523192747452088PEHS370PEHS40005364.168 Lat364.1615814652241736518457
1361145502362523292747452088PISH388PISH55396364.168 Lat364.1615814652241736518457
1548352517681423472747452088WESP492WESP9801034364.168 LAT364.1615814652241736518457
2200954575625324692747452088KEHS274KEHS013280364.16 LAT364.1615825759371742569409
2602483610634623672747452088WAS469WOS60033364.16 LAT364.1616377825731736800991