| Item type | Current library | Collection | Call number | Copy number | Status | Barcode | |
|---|---|---|---|---|---|---|---|
PhD Research
|
SXU PhD Library Lending Section | 364.168 KAU(SAI) (Browse shelf(Opens below)) | 414 | Available | 414 | ||
PhD Research
|
SXU PhD Library Lending Section | 364.168 KAU(SAI).C1 (Browse shelf(Opens below)) | 415 | Available | 415 | ||
Reference PhD Research
|
SXU PhD Library Reference Section | Reference | R 364.168 KAU(SAI) (Browse shelf(Opens below)) | 397 | Not For Loan | 397 |
Table of contents:
Identifying Cybercrime Motives --
How Can You be Affected by Cybercrime? --
Spam Methods --
Malware Tools --
Phishing Ways --
Identity Theft Methods --
Denial-of-Service Attack --
Damage by Botnets --
Hacking and Structured Query Language Injection --
Social Engineering Techniques --
Newer Threats --
Impact of Cybercrime --
Trends in Cybercrime --
Role of Government and Regulatory Mechanisms --
Sailing Safe --
Suggestions for Building a Security Programme and Concluding Remarks.
There are no comments on this title.

Text