Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
User preference of cyber security awareness delivery methodsAbawajy, JemalBehaviour & information technology, 2014-03, Vol.33 (3), p.237-248 [Periódico revisado por pares]Colchester: Taylor & FrancisTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
Resilience to leaking--dynamic systems modeling of information securityHamacher, Kay Dehmer, MatthiasPloS one, 2012-12, Vol.7 (12), p.e49804-e49804 [Periódico revisado por pares]United States: Public Library of ScienceTexto completo disponível |
3 |
Material Type: Artigo
|
![]() |
Phishing for phishing awarenessJansson, K. ; von Solms, R.Behaviour & information technology, 2013-06, Vol.32 (6), p.584-593 [Periódico revisado por pares]Colchester: Taylor & FrancisTexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
Digital forensics: modern crime often leaves an electronic trail. Finding and preserving that evidence requires careful methods as well as technical skillGarfinkel, Simson LAmerican scientist, 2013-09, Vol.101 (5), p.370Sigma Xi, The Scientific Research SocietyTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Dissecting social engineeringTetri, Pekka ; Vuorinen, JukkaBehaviour & information technology, 2013-10, Vol.32 (10), p.1014-1023 [Periódico revisado por pares]Colchester: Taylor & FrancisTexto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Global Freedom of Expression Within Nontextual FrameworksSoeraker, Johnny HartzThe Information society, 2008-01, Vol.24 (1), p.40-46 [Periódico revisado por pares]London: Taylor & Francis GroupTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
Protection against unauthorized access and computer crime in Norwegian enterprisesHagen, Janne Merete ; Sivertsen, Tormod Kalberg ; Rong, ChunmingJournal of computer security, 2008-01, Vol.16 (3), p.341-366 [Periódico revisado por pares]Texto completo disponível |
8 |
Material Type: Artigo
|
![]() |
Tighter cybersecurityDENNING, DOROTHY E. ; SMITH, GEORGEIssues in science and technology, 2003-09, Vol.20 (1), p.7-8 [Periódico revisado por pares]Washington: The University of Texas at DallasTexto completo disponível |
9 |
Material Type: magazinearticle
|
![]() |
Online fraud, hacks, and scams, oh myAckermann, RebeccaTechnology review (1998), 2023-09, Vol.126 (5), p.78-82Cambridge: Technology Review, IncTexto completo disponível |
10 |
Material Type: Resenha
|
![]() |
Encyclopedia of CybercrimeLear, Bernadette A.Reference & User Services Quarterly, 2009, Vol.49 (1), p.96-96 [Periódico revisado por pares]Chicago: American Library AssociationTexto completo disponível |