This book describes the challenges involved in fighting cybercrime, discussing cyberterrorism, identity theft, malicious software attacks, and other crimes by hackers.
hid | mid | miid | nid | wid | location_code | location | barcode | callnum | dewey | created | updated |
---|---|---|---|---|---|---|---|---|---|---|---|
222288 | 4088470 | 1888 | 103212 | 166980 | BATH | 103 | BATH42903 | 363.25 Par 2008 | 363.25 | 1577459752 | 1684524115 |
415079 | 4236834 | 2263 | 103212 | 166980 | GENH | 224 | GENH05563 | 363.25 PAR | 363.25 | 1577459752 | 1709567815 |
2496463 | 6014100 | 2125 | 103212 | 166980 | SFH | 415 | SFS0061405 | 363.25 PAR | 363.25 | 1637782573 | 1695044385 |
3020693 | 6477934 | 2107 | 103212 | 166980 | PCS | 303 | T 40536 | 363.25 PAR | 363.25 | 1637782573 | 1695044385 |
3020694 | 6477934 | 2107 | 103212 | 166980 | PCS | 303 | PCS0081295 | 363.25 PAR | 363.25 | 1637782573 | 1695044385 |