Showing 201 - 220 results of 320 for search '"computer crime"', query time: 1.87s Refine Results
  1. 201
  2. 202
  3. 203
    by 林煒翔
    Published 1998
    ...碩士 === 中央警察大學 === 警政研究所 === 86 ===   Computer crime has become one of the new patten of crimes...
    Get full text
    Others
  4. 204
    by Shih-Chi Ou, 歐師綺
    Published 2008
    ... access and identity theft. Firstly, we will have an overview of computer crime legislation and what...
    Get full text
    Others
  5. 205
    by CHEN, HSIEN-WEI, 陳憲緯
    Published 2012
    ... crime in theories, finishing the opinion of our theory and amending the law, and introduces the computer...
    Get full text
    Others
  6. 206
    by LIN, JEN-YIN, 林禎瑩
    Published 2015
    ... or technique of computer crime will continently have innovation or evolution. The harm and impact caused...
    Get full text
    Others
  7. 207
    by Rojas Parra, Jaime Hernán
    Published 2016-12-01
    ... of existing criminal law and force, identification of established computer crime, selection of computer crime...
    Get full text
    Article
  8. 208
    by Huey-Fang Lee, 李惠方
    Published 2006
    ... computer crime and its evidence collection in our Criminal Laws and Criminal Procedure Laws. Due to its...
    Get full text
    Others
  9. 209
    by Janýšková, Zuzana
    Published 2010
    ...INTERNET AND COMPUTER CRIME (SUMMARY) The purpose of this thesis is to provide an introduction...
    Get full text
    Dissertation
  10. 210
    by NAI-YUAN HSIAO, 蕭乃元
    Published 2007
    ..., the result of Computer Crime would cause damages in EMR to different extent. Meanwhile, even though any...
    Get full text
    Others
  11. 211
    by Siniša Franjić
    Published 2020-10-01
    ...Computer crime is a form of criminal behavior in which the use of computer technology...
    Get full text
    Article
  12. 212
    by Chih-Hung Hsieh, 謝志宏
    Published 2010
    ...%) of these exceeding 1 Gbps[1]. In addition, under the CSI (Computer Crime and Security Survey) survey[2] that DDoS...
    Get full text
    Others
  13. 213
  14. 214
    by CHI HSING TSENG, 曾繼興
    Published 2007
    ...碩士 === 大同大學 === 資訊經營學系(所) === 95 === With the rapid development of Internet, computer crime happens...
    Get full text
    Others
  15. 215
    by Shih-Kang Yen, 顏世剛
    Published 2010
    ... crimes? In computer crime, it will be computer forensics to understand crime and find criminal. About...
    Get full text
    Others
  16. 216
    by Archer Yang, 楊禮峰
    Published 2009
    ... security. Many countries currently plan to develop dedicated computer crime units; training professionals...
    Get full text
    Others
  17. 217
    ... crime. Computer crime will leave traces of criminal activity, so it is necessary to analyze...
    Get full text
    Article
  18. 218
    by Johansen, Marie Kristin
    Published 2007
    ... and secure infrastructure for the organizations. The Australian Computer Crime Surveys presents four...
    Get full text
    Others
  19. 219
    by Lin, Biing-Jong, 林秉忠
    Published 1999
    ...碩士 === 國立中山大學 === 資訊管理學系 === 87 === According to a computer crime and security survey from FBI...
    Get full text
    Others
  20. 220
    by Nono Supriatna, R Nelly Nur Apandi
    Published 2017-08-01
    ..., the characteristics of fraud, an effort to minimize fraud through prevention, detection, investigation, computer crime...
    Get full text
    Article