This book describes the challenges involved in fighting cybercrime, discussing cyberterrorism, identity theft, malicious software attacks, and other crimes by hackers.
| hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
|---|---|---|---|---|---|---|---|---|---|---|---|
| 222288 | 4088470 | 1888 | 103212 | 166980 | BATH | 103 | BATH42903 | 363.25 Par 2008 | 363.25 | 1577459752 | 1684524115 |
| 415079 | 4236834 | 2263 | 103212 | 166980 | GENH | 224 | GENH05563 | 363.25 PAR | 363.25 | 1577459752 | 1709567815 |
| 2496463 | 6014100 | 2421 | 103212 | 166980 | SFH | 415 | SFS0061405 | 363.25 PAR | 363.25 | 1637782573 | 1736800991 |
| 3020693 | 6477934 | 2408 | 103212 | 166980 | PCS | 303 | T 40536 | 363.25 PAR | 363.25 | 1637782573 | 1736800991 |
| 3020694 | 6477934 | 2408 | 103212 | 166980 | PCS | 303 | PCS0081295 | 363.25 PAR | 363.25 | 1637782573 | 1736800991 |