Works matching DE "PREVENTION of computer hacking"
1
- Loss Prevention Bulletin, 2012, n. 224, p. 5
- Article
2
- ISSA Journal, 2019, v. 17, n. 1, p. 6
- Article
3
- Strategic Finance, 2017, v. 99, n. 4, p. 62
- ROHRER, KARTER K.;
- HOM, NATHANIEL S.
- Article
4
- Strategic Finance, 2005, v. 86, n. 11, p. 55
- Article
5
- Strategic Finance, 2005, v. 86, n. 9, p. 31
- Article
6
- Strategic Finance, 1999, v. 81, n. 5, p. 38
- Article
7
- Social Science Computer Review, 2011, v. 29, n. 3, p. 369, doi. 10.1177/0894439310382519
- Barnett, George A.;
- Chung Joo Chung;
- Han Woo Park
- Article
8
- Berkeley Technology Law Journal, 2011, v. 26, n. 1, p. 905
- Article
9
- ITNOW, 2018, v. 60, n. 2, p. 36, doi. 10.1093/itnow/bwy047
- Chauhan, Heetesh;
- Middup, Christopher
- Article
10
- ITNOW, 2016, v. 58, n. 4, p. 26, doi. 10.1093/itnow/bww100
- Article
11
- ITNOW, 2015, v. 57, n. 1, p. 34, doi. 10.1093/itnow/bwv014
- Article
12
- ITNOW, 2013, v. 55, n. 4, p. 38, doi. 10.1093/itnow/bwt080
- Walker-Osborn, Charlotte;
- Norris, Edward
- Article
13
- Journal of Financial Planning, 2015, v. 28, n. 5, p. 24
- Article
14
- Journal of Financial Planning, 2012, v. 25, n. 3, p. 42
- Article
15
- World Libraries, 2020, v. 24, n. 1, p. 1
- Article
16
- Electronics Letters (Wiley-Blackwell), 2019, v. 55, n. 9, p. 540, doi. 10.1049/el.2019.0022
- Article
17
- International Journal of Cyber Criminology, 2018, p. 333, doi. 10.5281/zenodo.1467935
- Ming-Li Hsieh;
- Shun-Yung Kevin Wang
- Article
18
- UMKC Law Review, 2014, v. 82, n. 4, p. 951
- Article
19
- Journal of Management Information Systems, 2012, v. 28, n. 4, p. 305, doi. 10.2753/MIS0742-1222280411
- Temizkan, Orcun;
- Kumar, Ram L.;
- Park, SungJune;
- Subramaniam, Chandrasekar
- Article
20
- Financial Innovation, 2016, v. 2, n. 1, p. 1, doi. 10.1186/s40854-016-0046-5
- Article
21
- Journal of Digital Forensics, Security & Law, 2016, v. 11, n. 2, p. 7
- Al-khateeb, Samer;
- Conlan, Kevin J.;
- Agarwal, Nitin;
- Baggili, Ibrahim;
- Breitinger, Frank
- Article
22
- Asia Weekly, 2008, v. 2, n. 37, p. 14
- Article
23
- ComputerWorld Hong Kong, 2015, p. 34
- Article
24
- ComputerWorld Hong Kong, 2015, p. 14
- Article
25
- ComputerWorld Hong Kong, 2010, v. 27, n. 9, p. 43
- Article
26
- Vanderbilt Journal of Entertainment & Technology Law, 2018, v. 21, n. 1, p. 309
- Article
27
- Florida Bar Journal, 2016, v. 90, n. 7, p. 8
- Article
28
- Asia-Pacific Defence Reporter, 2015, v. 41, n. 9, p. 28
- Article
29
- Cardozo Arts & Entertainment Law Journal, 2016, v. 34, n. 1, p. 281
- Article
30
- Internal Auditor, 2016, v. 73, n. 4, p. 18
- Article
31
- International Journal of Network Management, 2016, v. 26, n. 3, p. 156, doi. 10.1002/nem.1923
- Jiang, Ci‐Bin;
- Liu, I‐Hsien;
- Chung, Yao‐Nien;
- Li, Jung‐Shian
- Article
32
- Columbia Human Rights Law Review, 2015, v. 47, n. 1, p. 242
- Article
33
- International Journal of System & Software Engineering, 2015, v. 3, n. 2, p. 10, doi. 10.21863/ijsse/2015.3.2.006
- Kapse, Dinesh S.;
- Bagdi, Vijay
- Article
34
- Access (10300155), 2016, v. 30, n. 4, p. 3
- Article
35
- Case Western Reserve Law Review, 2015, v. 65, n. 3, p. 861
- Article
36
- Loyola of Los Angeles International & Comparative Law Review, 2023, v. 46, n. 1, p. 45
- Article
37
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 27
- Article
38
- Contract Management, 2015, v. 55, n. 8, p. 58
- Article
39
- Distributed Computing, 2017, v. 30, n. 2, p. 103, doi. 10.1007/s00446-016-0280-0
- Gilbert, Seth;
- Newport, Calvin;
- Zheng, Chaodong
- Article
40
- China Business Review, 2014, p. 1
- Article
41
- Journal of Information System Security, 2011, v. 7, n. 1, p. 24
- Posey, Clay;
- Bennett, Rebecca J.;
- Roberts, Tom L.;
- Lowry, Paul Benjamin
- Article
42
- Intelligent Automation & Soft Computing, 2016, v. 22, n. 3, p. 423, doi. 10.1080/10798587.2015.1121615
- Tsai, Kun-Lin;
- Leu, Fang-Yie;
- Tsai, Shun-Hung
- Article
43
- Alabama Lawyer, 2014, v. 75, n. 1, p. 31
- Article
44
- William & Mary Bill of Rights Journal, 2019, v. 28, n. 1, p. 197
- Article
45
- Rutgers Computer & Technology Law Journal, 2016, v. 42, n. 1, p. 120
- Article
46
- Victims & Offenders, 2016, v. 11, n. 4, p. 534, doi. 10.1080/15564886.2015.1121944
- Chua, Yi Ting;
- Holt, Thomas J.
- Article
47
- Multimedia Tools & Applications, 2015, v. 74, n. 16, p. 6509, doi. 10.1007/s11042-014-2127-7
- Park, Kwang;
- Shin, Hoon;
- Park, Won;
- Lim, Jong
- Article
48
- Wireless Personal Communications, 2016, v. 89, n. 3, p. 761, doi. 10.1007/s11277-015-3116-5
- Article
49
- Journal of the Association for Information Systems, 2010, v. 11, n. 7, p. 394
- Huigang Liang;
- Yajiong Xue
- Article
50
- International Journal of Information Security, 2015, v. 14, n. 2, p. 169, doi. 10.1007/s10207-014-0244-y
- Egners, André;
- Herrmann, Patrick;
- Meyer, Ulrike
- Article