Limit search to available items
Result Page   1 2 3 4 5 6 Next
Add Marked to Bag Add All On Page Add Marked to My Lists
Subjects (1-50 of 299)
Computer crimes.
1
Streaming video
2011

7.30: 13/07/11



Australia : ABC, 2011

Rating:

 
 
2
Streaming video
2012

7.30: 19/12/12



Australia : ABC, 2012

Rating:

 
 
3
Streaming video
2011

7.30: 29/12/11



Australia : ABC, 2011

Rating:

 
 
4
Streaming video
2016

7.30: October 12, 2016



Australia : ABC, 2016

Rating:

 
 
5
Streaming video
2010

The 7.30 Report: 21/10/10



Australia : ABC, 2010

Rating:

 
 
6
Streaming video
2014

60 Minutes: Birdsville/The Dark Web/The Great White



Australia : NINE, 2014

Rating:

 
 
7
Streaming video
2011

60 Minutes: Cyber War/The Guru Busters/Trouble in Paradise



Australia : NINE, 2011

Rating:

 
 
8
Streaming video
2014

60 Minutes: Love Scam/The Cahill Express/Russian Revolution



Australia : NINE, 2014

Rating:

 
 
9
Streaming video
2011

60 Minutes: One Click From Disaster/New Hope/Frozen Fortunes



Australia : NINE, 2011

Rating:

 
 
10
Streaming video
2018

101 East : Swindle Kings Of Manila



Australia : Al Jazeera English [broadcaster], 2018 September 14 at 08:30:00

Rating:

 
 
11
Book
2011

The art of the internet : a study of illegal online trading of cultural goods


Ham, Tom van, author
Utrecht : Eleven International Publishing, [2011] copyright 2011

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  363.69 Ham/Aot  AVAILABLE
12
Book
2002

An assessment of cyber terrorism


Coggle, A
Geelong, Vic. : Deakin University, School of Computing and Mathematics, 2002

Rating:

Request It 
 
Location Call no. Vol. Availability
 ADPML SPDU  303.625 Cog/Aoc  LIB USE ONLY
 MELB  303.625 Cog/Aoc  AVAILABLE
13
Book
2002

Asymmetric risk


McIntyre, J.
Geelong, Vic. : Deakin University, School of Information Technology, 2002

Rating:

 
 
Location Call no. Vol. Availability
 ADPML SPDU  303.625 Mci/Ari  LIB USE ONLY
14
Book
1996

Bandits on the information superhighway


Barrett, Daniel J.
Bonn ; Cambridge : O'Reilly & Assoc., 1996

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  303.4833 Bar/Wyn  AVAILABLE
15
Streaming video
2019

Behind the News : February 26, 2019



Australia : ABC ME [broadcaster], 2019 February 26 at 10:00:00

Rating:

 
 
16
Streaming video
2013

Behind The News Specials: Cyber Sense



Australia : ABC, 2013

Rating:

 
 
17
Book
2005

Black Hat physical device security : exploiting hardware and software


Miller, Drew, 1978-
Rockland, MA : Syngress ; [Sebastopol, CA] : Distributed by O'Reilly in the United States and Canada, 2005

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Mil/Bhp  AVAILABLE
 MELB  005.8 Mil/Bhp  AVAILABLE
18
Book
2004

Black hats : misfits, criminals, and scammers in the Internet age


Biggs, John, 1975-
Berkeley, CA : Apress, 2004

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  005.8 Big/Bhm  AVAILABLE
19
Book
2003

Black Ice : the invisible threat of Cyber-Terrorism


Verton, Dan.
Emeryville., California : McGraw Hill/Osborne, [2003]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  303.625 Ver/Bit  AVAILABLE
20
Book
1978

A book of answers


Hope, A. D. (Alec Derwent), 1907-2000.
London ; Sydney ; Melbourne : Angus and Robertson, 1978

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  827.03 H7918 A21/B  AVAILABLE
21
Streaming video
2017

Breakthrough: Cyber Terror - Series 2 - Ep 2



Australia : National Geographic, 2017

Rating:

 
 
22
Book
2010

Bullying in a cyber world



Greenwood, W.A. : R.I.C Publications, [2010]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'BOOL CRC  302.343 Bia/Cwo  1  AVAILABLE
 W'BOOL CRC  302.343 Bia/Cwo  2  AVAILABLE
 W'BOOL CRC  302.343 Bia/Cwo  3  AVAILABLE
View additional copies of this item
23
Streaming video
2012

The challenge of protecting mobile device security



New York : Bloomberg, 2012

Rating:

 
 
24
Streaming video
2013

The changing face of cyber attacks



New York : Bloomberg, 2013

Rating:

 
 
25
DVD video
2014

Citizenfour



[Australia] Madman Entertainment, [2014]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  327 Poi/Caf  AVAILABLE
26
Book
1987

Combating commercial crime



Sydney : Law Book Company, 1987

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  KM 540.3 Wes/Ccc  AVAILABLE
27
Streaming video
2013

The coming wave of cyber attacks



New York : Bloomberg, 2013

Rating:

 
 
28
Streaming video
2013

Compass: Beating Cyberbullying



Australia : ABC, 2013

Rating:

 
 
29
E-book
2015

A comprehensive look at fraud identification and prevention


Youngblood, James, 1960-
Boca Raton, FL : CRC Press, [2015]

Rating:

 
 
30
Book
1978

Computer capers : tales of electronic thievery, embezzlement, and fraud


Whiteside, Thomas, 1918-1997.
New York : Crowell, [1978]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  364.162 Whi  AVAILABLE
31
Book
1978

Computer capers : tales of electronic thievery, embezzlement, and fraud


Whiteside, Thomas, 1918-1997.
New York : New American Library, 1978

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  364.162 Whi  AVAILABLE
32
Book
1995

Computer crime : a crimefighter's handbook


Icove, David J., 1949-
Sebastopol, CA : O'Reilly & Associates, 1995

Rating:

Request It 
 
Location Call no. Vol. Availability
 WATERFT LAW  KM 565 C5 G1 Ico/Cca  AVAILABLE
 MELB  KM 565 C5 G1 Ico/Cca  AVAILABLE
 W'BOOL  364.162 Ico/Cca  AVAILABLE
33
Location Call no. Vol. Availability
 W'PONDS  005.8 Bur/Cds  AVAILABLE
34
Book
1990

Computer ethics : cautionary tales and ethical dilemmas in computing


Forester, Tom.
Oxford ; Cambridge, Mass. : Basil Blackwell, [1990]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  174.90904 FOR-C  AVAILABLE
35
Book
2004

Computer forensics & cyber crime : an introduction


Britz, Marjie.
Upper Saddle River, NJ : Pearson/Prentice Hall, [2004]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  363.25968 Bri/Cfa  AVAILABLE
 W'PONDS  363.25968 Bri/Cfa  AVAILABLE
 W'PONDS  363.25968 Bri/Cfa  AVAILABLE
View additional copies of this item
36
Location Call no. Vol. Availability
 MELB  363.25968 Bri/Cfa 2012  AVAILABLE
37
E-book
2014

Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklären


Goschenneck, Alexander
Heidelberg : Dpunkt.verlag, [2014]

Rating:

 
 
38
Book
1979

Computer fraud and countermeasures


Krauss, Leonard I.
Englewood Cliffs : Prentice-Hall, [1979]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  364.163 Kra  AVAILABLE
39
E-book
2009

Computer fraud casebook : the bytes that bite



Hoboken, N.J. : Wiley, [2009]

Rating:

 
 
40
Book
2011

Computer network security and cyber ethics


Kizza, Joseph Migga.
Jefferson, N.C. : McFarland, [2011]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'BOOL  005.8 Kiz/Cns 2011  AVAILABLE
 W'PONDS  005.8 Kiz/Cns 2011  AVAILABLE
 MELB  005.8 Kiz/Cns 2011  AVAILABLE
41
Book
1996

Computer security


Carroll, John Millar
Boston, Mass. : Butterworth-Heinemann, 1996

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  658.47 Car/Cse 1996  AVAILABLE
42
Book
2004

Computer security for the home and small office


Greene, Thomas C.
New York : Apress, [2004]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  658.478 Gre/Csf  AVAILABLE
43
Book
1995

Computer software protection


Australia. Copyright Law Review Committee.
Barton, A.C.T. : Office of Legal Information and Publishing, Attorney-General's Dept., [1995]

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  KN 112.7 K1 Aus/Csp  AVAILABLE
44
Book
1984

Computers, data processing, and the law


Mandell, Steven L.
St. Paul : West Pub. Co., [1984]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  KN 347 G1 Man/Cdp  AVAILABLE
45
Book
2008

Confronting Cyber-bullying : what schools need to know to control misconduct and avoid legal consequences


Shariff, Shaheen.
Cambridge ; New York : Cambridge University Press, 2008

Rating:

Request It 
 
Location Call no. Vol. Availability
 MELB  371.58 Sha/Ccb  AVAILABLE
 W'BOOL  371.58 Sha/Ccb  AVAILABLE
46
E-book
2009

Confronting Cyber-bullying : what schools need to know to control misconduct and avoid legal consequences


Shariff, Shaheen.
Cambridge, UK : Cambridge University Press, 2009

Rating:

 
 
47
E-book
2008

Confronting cyber-bullying : what schools need to know to control misconduct and avoid legal consequences


Shariff, Shaheen.
Cambridge : Cambridge University Press, 2008

Rating:

 
 
48
E-book
2018

Confronting cyberespionage under international law


Pehlivan, Oğuz Kaan, author
New York : Routledge, 2018

Rating:

 
 
49
E-book
2011

Corporate hacking and technology-driven crime : social dynamics and implications



Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), [2011]

Rating:

 
 
50
Book
1979

The CPA and computer fraud


Wagner, Charles R.
Lexington, Mass. : Lexington Books, [1979]

Rating:

Request It 
 
Location Call no. Vol. Availability
 W'PONDS  364.163 WAG  AVAILABLE
Add Marked to Bag Add All On Page
Locate in results
Result Page   1 2 3 4 5 6 Next