Zustand: Good. Used book that is in clean, average condition without any missing pages.
Zustand: Very Good. Used book that is in excellent condition. May show signs of wear or have minor defects.
Zustand: Very Good. Former library book; may include library markings. Used book that is in excellent condition. May show signs of wear or have minor defects.
Hardcover. Zustand: Very Good. No Jacket. Former library book; May have limited writing in cover pages. Pages are unmarked. ~ ThriftBooks: Read More, Spend Less.
Anbieter: suffolkbooks, Center moriches, NY, USA
hardcover. Zustand: Very Good. Fast Shipping - Safe and Secure 7 days a week!
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: Basi6 International, Irving, TX, USA
Zustand: Brand New. New. US edition. Expediting shipping for all USA and Europe orders excluding PO Box. Excellent Customer Service.
EUR 70,47
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 69,27
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Zustand: New. pp. 320.
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: ALLBOOKS1, Direk, SA, Australien
Brand new book. Fast ship. Please provide full street address as we are not able to ship to P O box address.
EUR 79,15
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 70,72
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Bloomsbury Publishing Plc, US, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Sprache: Englisch
Anbieter: Rarewaves.com USA, London, LONDO, Vereinigtes Königreich
EUR 95,07
Anzahl: Mehr als 20 verfügbar
In den WarenkorbHardback. Zustand: New. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.
Anbieter: GreatBookPricesUK, Woodford Green, Vereinigtes Königreich
EUR 79,95
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: As New. Unread book in perfect condition.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 104,42
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 300 pages. 9.10x6.20x1.30 inches. In Stock.
Verlag: Bloomsbury Publishing Plc, US, 2013
ISBN 10: 1610692764 ISBN 13: 9781610692762
Sprache: Englisch
Anbieter: Rarewaves.com UK, London, Vereinigtes Königreich
EUR 87,99
Anzahl: Mehr als 20 verfügbar
In den WarenkorbHardback. Zustand: New. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: Lucky's Textbooks, Dallas, TX, USA
EUR 177,97
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 173,50
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Majestic Books, Hounslow, Vereinigtes Königreich
EUR 73,97
Anzahl: 4 verfügbar
In den WarenkorbZustand: New. Print on Demand pp. 320.
Anbieter: Biblios, Frankfurt am main, HESSE, Deutschland
Zustand: New. PRINT ON DEMAND pp. 320.
Anbieter: moluna, Greven, Deutschland
EUR 74,94
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.Über den AutorThomas .
Anbieter: PBShop.store US, Wood Dale, IL, USA
EUR 192,22
Anzahl: Mehr als 20 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 185,44
Anzahl: Mehr als 20 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 194,91
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. It presents current research undertakings and findings in order to find i.
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: preigu, Osnabrück, Deutschland
Buch. Zustand: Neu. Corporate Hacking and Technology-Driven Crime | Social Dynamics and Implications | Thomas J. Holt (u. a.) | Buch | Gebunden | Englisch | 2010 | Information Science Reference | EAN 9781616928056 | Verantwortliche Person für die EU: Libri GmbH, Europaallee 1, 36244 Bad Hersfeld, gpsr[at]libri[dot]de | Anbieter: preigu Print on Demand.
Verlag: Information Science Reference, 2010
ISBN 10: 1616928050 ISBN 13: 9781616928056
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In an age when computer crime is growing at a exponential rate and on a global scale, industry and government leaders are increasingly reliant upon answers from the academic and IT Security fields in order to keep cyber crime in check, and be ahead of the 'cyber criminal curve.' Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications addresses various aspects of hacking and technology-driven crime, including the ability to understand computer-based threats, identify and examine attack dynamics, and find solutions. Including findings from experts in Criminal Justice, Business, and Information Technology Security from around the world, this book presents current research undertakings and findings in order to find interdisciplinary solutions to the complex domain of cyber crime and network breaches.