Linked e-resources
Details
Table of Contents
Part 1- Approaching Cybercrime and Cyberterrorism Research
Part 2- Legal, Ethical and Privacy Considerations
Part 3- Technologies, Scenarios and Best Practices
Part 4- Policy Development and Roadmaps for CC/CT Research.
Part 2- Legal, Ethical and Privacy Considerations
Part 3- Technologies, Scenarios and Best Practices
Part 4- Policy Development and Roadmaps for CC/CT Research.