Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "cycling"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"364 - Criminology"
language:"English"
Search alternatives
:
"cycling" »
"recycling"
Showing
1
-
20
of
20
Search:
'"cycling"'
,
query time: 0.11s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
The apology ritual : a philosophical theory of punishment
by
Bennett, Christopher
Published 2008
Cambridge University Press
Table of Contents:
“
... -- Responsibility, reactive attitudes and the right to be punished -- Non-retributive dialogue -- The
cycle
of blame...
”
Call Number:
HV8688
Read Now
2
Malicious bots : an inside look into the cyber-criminal underground of the internet
by
Dunham, Ken
Published 2009
Auerbach Publications
Table of Contents:
“
... and the eCrime
cycle
: the iSIGHT partners' approach -- Technical introduction to bots -- Mitigation -- Concluding...
”
Call Number:
HV6773
Read Now
3
Intelligence-driven incident response : outwitting the adversary
by
Roberts, Scott J.
,
Brown, Rebekah
Published 2017
O'Reilly Media
Table of Contents:
“
...Tools for Tracking ActionsPurpose-Built Tools; Assessing the Damage; Monitoring Life
Cycle
...
”
Call Number:
HV8079.C65
Read Now
4
Incident response techniques for ransomware attacks : understand modern ransomware attacks and build an incident response strategy to work through them
by
Skulkin, Oleg
Published 2022
Packt Publishing, Limited
Table of Contents:
“
...-Operated Ransomware Attacks -- Chapter 2: The Life
Cycle
of a Human-Operated Ransomware Attack -- Chapter 3...
”
Call Number:
QA76.9.A25
Read Now
5
Intelligence-Driven Incident Response : outwitting the adversary
by
Brown, Rebekah
,
Roberts, Scott J.
Published 2023
O'Reilly Media, Inc.
Table of Contents:
“
... and Methods -- Models -- Using Models for Collaboration -- Process Models -- Using the Intelligence
Cycle
...
”
Call Number:
HV8079.C65
Read Now
6
Treason : medieval and early modern adultery, betrayal, and shame
Published 2019
Brill
Table of Contents:
“
... identity, loyalty, and treason in the
Cycle
du Roi / Ana Grinberg -- Traitors respond : English Catholic...
”
Call Number:
HV6295.E85
Read Now
7
The Palgrave Handbook of Youth Gangs in the UK
Published 2023
Palgrave Macmillan
Table of Contents:
“
...: Breaking the
Cycle
of Gang Violence -- Chapter 26: Using Ex-Gang Members as Peer Youth Workers -- Chapter...
”
Read Now
8
Implementing digital forensic readiness : from reactive to proactive process
by
Sachowski, Jason
Published 2016
Syngress
Table of Contents:
“
... DEVELOPMENT LIFE
CYCLE
; SUMMARY; TAXONOMY; 7 -- Determine Collection Requirements; INTRODUCTION; PRECOLLECTION...
”
Call Number:
HV8079.C65
Read Now
9
Envisioning Criminology : Researchers on Research as a Process of Discovery
Published 2015
Springer International Publishing
Table of Contents:
“
...: Twists, Turns and Tears on the Path to the
Cycle
of Violence Cathy Spatz Widom -- Section 4: Analyses...
”
Read Now
10
Handbook of anti-money laundering
by
Cox, Dennis W.
Published 2014
Wiley
Table of Contents:
“
...-Laundering
Cycle
; 2.1.1 The Placement Phase; 2.1.2 The Layering Phase; 2.1.3 The Integration Phase; Chapter 3...
”
Call Number:
K1089
Read Now
11
Threat intelligence in practice : a practical guide to threat intelligence from successful organizations
by
Liska, Allan
Published 2018
O'Reilly Media
“
..., security architect at Recorded Future, takes you through the threat intelligence
cycle
and explains what...
”
Call Number:
HV6773
Read Now
12
Incarceration and Generation, Volume II : Challenging Generational Relations
Published 2022
Palgrave Macmillan
“
... transmission, age and aging, and other topics relevant to our movement through the life
cycle
and through...
”
Read Now
13
Elgar encyclopedia of services
Published 2023
Edward Elgar Publishing
Table of Contents:
“
... Networks (PSINs) / Faïz Gallouj and Nizar Gallouj -- The Reverse Product
Cycle
Model (Barras) / Faridah...
”
Call Number:
HV12
Read Now
14
Incident Response with Threat Intelligence : Practical Insights into Developing an Incident Response Capability Through Intelligence-Based Threat Hunting
by
Martinez, Roberto
Published 2022
Packt Publishing
“
..., contention, and eradication stages of the incident response
cycle
. As you progress through the chapters...
”
Call Number:
QA76.9.A25
Read Now
15
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
by
Lillard, Terrence
Published 2010
Syngress
“
...-based traffic is covered as well as the typical life
cycle
of a network forensics investigation...
”
Call Number:
HV8079.C65
Read Now
16
Digital forensics explained
Published 2021
CRC Press
“
...This book covers the full life
cycle
of conducting a mobile and computer digital forensic...
”
Call Number:
HV8079.C65
Read Now
17
Handbook of Evidence-Based Substance Abuse Treatment in Criminal Justice Settings
Published 2011
Springer New York
“
.... It's a
cycle
often destined to persist, in large part because the critical step that is often missing...
”
Read Now
18
Domestic Violence and Maternal and Child Health : New Patterns of Trauma, Treatment, and Criminal Justice Responses
by
Morewitz, Stephen J.
Published 2004
Springer US
“
.... The long-term societal impacts of violence are significant for the
cycle
of violence can be transmitted one...
”
Read Now
19
What every engineer should know about cyber security and digital forensics
by
DeFranco, Joanna F.
,
Maley, Bob
Published 2022
CRC Press
“
...., blockchain) and adds new sections on strategy based on the OODA (observe-orient-decide-act) loop in the
cycle
...
”
Call Number:
TK5105.59
Read Now
20
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud)
by
Cappelli, Dawn
Published 2012
Addison-Wesley
Call Number:
HV6773
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 364 - Criminology
Clear Filter
Language: English
Year of Publication
From:
To:
Classification
364 - Criminology
500 - Natural sciences & mathematics
6
331 - Labor economics
5
005 - Computer programming, programs & data
3
363 - Other social problems & services
2
000 - Computer science, information & general works
1
more ...
001 - Knowledge
1
330 - Economics
1
338 - Production
1
620 - Engineering & allied operations
1
621 - Applied physics
1
658 - General management
1
see all ...
less ...
Language
English
Collection
O'Reilly
12
Springer eBooks 2005-
4
Cambridge Books Online
1
Edward Elgar eBooks Collection Business & Economics
1
JSTOR Open Access Books
1
Springer Book Archives -2004
1
Author
Brown, Rebekah
2
Roberts, Scott J.
2
Andell, Paul
1
Bennett, Christopher
1
Cappelli, Dawn
1
Carvalho, Maria João Leote de
1
more ...
Cox, Dennis W.
1
DeFranco, Joanna F.
1
Duarte, Vera
1
Dunham, Ken
1
Gallouj, Camal
1
Gallouj, Faïz
1
Gogolin, Greg
1
Gomes, Silvia
1
Gregrich, John
1
Gullotta, Thomas P.
1
Ivtchenko, Dmitri
1
Johnson, Jeannie L
1
Lee, Rob
1
Leukefeld, Carl
1
Lillard, Terrence
1
Liska, Allan
1
Maley, Bob
1
Maltz, Michael D.
1
Martinez, Roberto
1
Melnick, Jim
1
Monnoyer, Marie-Christine
1
Moore, Andrew
1
Morewitz, Stephen J.
1
Pitts, John
1
Rice, Stephen K.
1
Rubalcaba-Bermejo, Luis
1
Sachowski, Jason
1
Skulkin, Oleg
1
Tracy, Larissa
1
Trzeciak, Randall
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&filter%5B%5D=language%3A%22English%22&lookfor=%22cycling%22&type=AllFields
Send by Email
×
Loading...