000735585 000__ 01765cam\a2200445\i\4500 000735585 001__ 735585 000735585 005__ 20210515111015.0 000735585 006__ m\\\\\o\\d\\\\\\\\ 000735585 007__ cr\cn\nnnunnun 000735585 008__ 140313t20142014enk\\\\\ob\\\\001\0\eng\d 000735585 020__ $$z9781848216716 000735585 020__ $$a9781118898956$$qelectronic book 000735585 035__ $$a(CaPaEBR)ebr10842304 000735585 035__ $$a(OCoLC)871224260 000735585 040__ $$aCaPaEBR$$beng$$erda$$epn$$cCaPaEBR 000735585 05014 $$aHV6773$$b.B476 2014eb 000735585 08204 $$a364.168$$223 000735585 1001_ $$aBernik, Igor. 000735585 24510 $$aCybercrime and cyberwarfare$$h[electronic resource] /$$cIgor Bernik. 000735585 264_1 $$aLondon ;$$aHoboken, New Jersey :$$bISTE :$$bWiley,$$c2014. 000735585 264_4 $$c©2014 000735585 300__ $$a1 online resource (177 pages). 000735585 336__ $$atext$$2rdacontent 000735585 337__ $$acomputer$$2rdamedia 000735585 338__ $$aonline resource$$2rdacarrier 000735585 4901_ $$aFOCUS Information Systems, Web and Pervasive Computing Series,$$x2051-249X 000735585 504__ $$aIncludes bibliographical references and index. 000735585 506__ $$aAccess limited to authorized users. 000735585 588__ $$aDescription based on print version record. 000735585 650_0 $$aComputer crimes$$xPrevention. 000735585 650_0 $$aComputer crimes. 000735585 650_0 $$aCyberspace$$xSecurity measures. 000735585 650_0 $$aInformation warfare. 000735585 650_0 $$aSecurity systems. 000735585 650_0 $$aThreats$$xSafety measures. 000735585 77608 $$iPrint version:$$aBernik, Igor.$$tCybercrime and cyberwarfare.$$dLondon ; Hoboken, New Jersey : ISTE : Wiley, c2014 $$z9781848216716 $$w2013952661 000735585 830_0 $$aFocus series in information systems, web and pervasive computing. 000735585 852__ $$bebk 000735585 85640 $$3ProQuest Ebook Central Academic Complete$$uhttps://univsouthin.idm.oclc.org/login?url=http://site.ebrary.com/lib/usiricelib/Doc?id=10842304$$zOnline Access 000735585 909CO $$ooai:library.usi.edu:735585$$pGLOBAL_SET 000735585 980__ $$aEBOOK 000735585 980__ $$aBIB 000735585 982__ $$aEbook 000735585 983__ $$aOnline