A DEEP AND PRECISE STUDY OF DIGITAL CRIME AND WEB SECURITY - A TECHNOLOGY ANALYSIS
Internet security - cyber crime, Ali Peiravi, 2Mehdi Peiravi, Marsland Press Journal of American Science 2010; 6(1): 15-24.
Aaron, G., Bostik, K. A. Chung, E. Rusmussen, R., (2008),"Protecting the web: Phishing, malware, and other security, threats", Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08, pp. 1253-1254.
Ben-Itzhak, Y., (2009), "Organised cybercrime and payment cards", Card Technology Today 2009; (2): 10-11.
Bhatia, J. S. Sehgal, R. Bhushan, B. Kaur, H., (2008), "Multi layer cyber attack detection through honeynet", Proceedings of New Technologies, Mobility and Security Conference and Workshops, NTMS 2008.
Blakeley, C. J., (2008), "Cybercrime law: international best practices", Doha information Security Conference, Doha, Qatar, June 10-11, 2008.
- There are currently no refbacks.
Send mail to firstname.lastname@example.org with questions or comments about this web site.
International Journal of Management and Social Sciences, All rights reserved.