Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "theory"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
dewey-ones:"500 - Natural sciences & mathematics"
dewey-ones:"364 - Criminology"
Showing
1
-
8
of
8
Search:
'"theory"'
,
query time: 0.05s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Practical cyber intelligence : how action-based intelligence can be an effective response to incidents
by
Bautista, Wilson
Published 2018
Packt Publishing
Subjects:
“
...Coding
theory
& cryptology / bicssc...
”
Call Number:
HV6773
Read Now
2
Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools
by
Parasram, Shiva V. N.
Published 2017
Packt Publishing
Subjects:
“
...Coding
theory
& cryptology / bicssc...
”
Call Number:
QA76.9.A25
Read Now
3
Financial crimes : a threat to global security
by
Edelbacher, Max
Published 2012
CRC Press
“
...Advances in police
theory
and practice series...
”
Call Number:
HV6768
Read Now
4
Fraud analytics using descriptive, predictive, and social network techniques : a guide to data science for fraud detection
by
Baesens, Bart
,
Van Vlasselaer, Véronique
,
Verbeke, Wouter
Published 2015
John Wiley & Sons, Inc.
“
... techniques than detecting fraud at the more advanced stages. This invaluable guide details both the
theory
...
”
Call Number:
HV6691
Read Now
5
Agent-based modeling of tax evasion : theoretical aspects and computational simulations
Published 2018
Wiley
Table of Contents:
“
...'s Behavior: From the Laboratory to Agentâ#x80;#x90;Based Simulations; 3.1 Tax Compliance:
Theory
and Evidence...
”
Call Number:
HV6341
Read Now
6
What every engineer should know about cyber security and digital forensics
by
DeFranco, Joanna F.
,
Maley, Bob
Published 2022
CRC Press
Call Number:
TK5105.59
Read Now
7
Cybersecurity : managing systems, conducting testing, and investigating intrusions
by
Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents:
“
... for Network Administrators; Summary; Assignments; Chapter 6: Protocol Analysis and; Networking
Theory
...
”
Call Number:
TK5105.59
Read Now
8
Contemporary digital forensic investigations of cloud and mobile applications
Published 2017
Syngress
Table of Contents:
“
... Forensic Strategies: A Routine Activity
Theory
/ K.-K.R. Choo -- 1. Introduction -- 2. Background...
”
Call Number:
TK5103.4837
Back
Narrow Search
Remove Filters
Clear Filter
Classification: 500 - Natural sciences & mathematics
Clear Filter
Classification: 364 - Criminology
Year of Publication
From:
To:
Classification
364 - Criminology
500 - Natural sciences & mathematics
331 - Labor economics
4
005 - Computer programming, programs & data
2
330 - Economics
2
363 - Other social problems & services
2
more ...
352 - General considerations of public administration
1
see all ...
less ...
Language
English
8
Collection
O'Reilly
8
Author
Baesens, Bart
1
Bautista, Wilson
1
Choo, Kim-Kwang Raymond
1
DeFranco, Joanna F.
1
Dehghantanha, Ali
1
Edelbacher, Max
1
more ...
Gulyás, László
1
Hokamp, Sascha
1
Koehler, Matthew
1
Kratcoski, Peter C.
1
Maley, Bob
1
Mowbray, Thomas J.
1
Parasram, Shiva V. N.
1
Shimonski, Robert
1
Theil, Michael
1
Van Vlasselaer, Véronique
1
Verbeke, Wouter
1
Wijesinghe, Sanith
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=dewey-ones%3A%22500+-+Natural+sciences+%26+mathematics%22&filter%5B%5D=dewey-ones%3A%22364+-+Criminology%22&lookfor=%22theory%22&type=AllFields
Send by Email
×
Loading...