Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "Subjectivity"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"001 - Knowledge"
dewey-ones:"364 - Criminology"
Search alternatives
:
subjectivity »
subjective
Showing
1
-
8
of
8
Search:
'"Subjectivity"'
,
query time: 0.01s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Introduction to cyber-warfare : a multidisciplinary approach
by
Shakarian, Paulo
Published 2013
Syngress
Subjects:
“
...Cyberterrorism / http://id.loc.gov/authorities/
subjects
/sh00001974...
”
Call Number:
U163
Read Now
2
Network forensics : tracking hackers through cyberspace
by
Davidoff, Sherri
Published 2012
Prentice Hall
Subjects:
“
...Forensic sciences / http://id.loc.gov/authorities/
subjects
/sh90001487...
”
Call Number:
HV8079.C65
Read Now
3
Malicious bots : an inside look into the cyber-criminal underground of the internet
by
Dunham, Ken
Published 2009
Auerbach Publications
Subjects:
“
...Internet / http://id.loc.gov/authorities/
subjects
/sh92002816...
”
Call Number:
HV6773
Read Now
4
Dissecting the hack : the f0rb1dd3n network
by
Street, Jayson E.
Published 2010
Syngress/Elsevier
Subjects:
“
...Computer networks / Security measures / http://id.loc.gov/authorities/
subjects
/sh94001277...
”
Call Number:
HV8079.C65
Read Now
5
Cyber crime and cyber terrorism investigator's handbook
Published 2014
Elsevier
Subjects:
“
...Computer crimes / Investigation / http://id.loc.gov/authorities/
subjects
/sh85029493...
”
Call Number:
HV8079.C65
Read Now
6
The fix : how bankers lied, cheated and colluded to rig the world's most important number
by
Vaughan, Liam
,
Finch, Gavin
Published 2017
John Wiley & Sons
Subjects:
“
...Interest rates / http://id.loc.gov/authorities/
subjects
/sh85067247...
”
Call Number:
HV6771.G7
Read Now
7
The true cost of information security breaches and cyber crime
by
Krausz, Michael
Published 2013
IT Governance Pub.
Subjects:
“
.../
subjects
/sh95010367...
”
Call Number:
QA76.9.A25
Read Now
8
Mobile malware attacks and defense
by
Dunham, Ken
Published 2009
Syngress Pub.
Subjects:
“
...Hackers / http://id.loc.gov/authorities/
subjects
/sh94005931...
”
Call Number:
TK5102.85
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 001 - Knowledge
Clear Filter
Classification: 364 - Criminology
Year of Publication
From:
To:
Classification
001 - Knowledge
364 - Criminology
331 - Labor economics
4
330 - Economics
3
005 - Computer programming, programs & data
2
363 - Other social problems & services
2
more ...
500 - Natural sciences & mathematics
2
338 - Production
1
355 - Military science
1
384 - Communications; telecommunication
1
658 - General management
1
see all ...
less ...
Language
English
8
Collection
O'Reilly
8
Author
Dunham, Ken
2
Abu-Nimeh, Saeed
1
Akhgar, Babak
1
Bosco, Francesca M.
1
Davidoff, Sherri
1
Elliot, Steve
1
more ...
Finch, Gavin
1
Ham, Jonathan
1
Krausz, Michael
1
Melnick, Jim
1
Shakarian, Paulo
1
Staniforth, Andrew
1
Street, Jayson E.
1
Vaughan, Liam
1
Walker, John
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22001+-+Knowledge%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&lookfor=%22Subjectivity%22&type=Subject
Send by Email
×
Loading...