Scientific Library of Tomsk State University

   E-catalog        

Refine your search


База знаний по целевым капиталам

  •    Эндаумент
       Фандрайзинг
       Нормативные документы

  • Your search returned 26 results.

    1.
    Nationalizing the Russian Empire the campaign against enemy aliens during World War I Eric Lohr.

    by Lohr, Eric, 1968-.

    Series: Russian research center studiesMaterial type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: Cambridge, Mass. [etc.] Harvard University Press 2003Availability: No items available :
    2.
    Foundations of computer security David Salomon

    by Salomon, David, 1938-.

    Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: London Springer 2006Online access: Table of contents | Publisher description Availability: No items available :
    3.
    Clarissa, or, The history of a young lady Samuel Richardson ; edited with an introduction and notes by Angus Ross

    by Richardson, Samuel, 1689-1761 | Ross, Angus [edt].

    Series: Penguin classicsMaterial type: Text Text; Format: print ; Nature of contents: biography; Literary form: Novels Publication details: London [a. o.] Penguin Books 2004Availability: No items available :
    4.
    Hide your a[ss]et[s] and disappear a step-by-step guide to vanishing without a trace Edmund J. Pankau

    by Pankau, Edmund J.

    Edition: 1st paperback ed.Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publication details: New York [a. o.] HarperCollins 2000Other title: Hide your assets.Online access: Publisher description | Contributor biographical information Availability: No items available :
    5.
    Corporate crime investigation. Jack Bologna, Paul Shaw.

    by Bologna, Jack | Shaw, Paul.

    Material type: Text Text; Format: print Publication details: Boston a.o.: Butterworth-Heinemann, 1977Availability: No items available :
    6.
    Dark places Gillian Flynn

    by Flynn, Gillian, 1971-.

    Edition: Crown Publishers international mass market editionMaterial type: Text Text; Format: print ; Literary form: Novels Publication details: New York Crown Publishers 2013Availability: No items available :
    7.
    Global cyber security labor shortage and international business risk Bryan Christiansen and Agnieszka Piekarz, editors.

    by Christiansen, Bryan, 1960- | Piekarz, Agnieszka, 1990- | IGI Global [publisher.].

    Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global, 2019Online access: EBSCOhost Availability: No items available :
    8.
    Handbook of research on trends and issues in crime prevention, rehabilitation, and victim support [edited by] Augusto Balloni, Raffaella Sette.

    by Balloni, Augusto | Sette, Raffaella.

    Series: Advances in criminology, victimology, serial violence, and the deep web (ACVSVDW) book seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, IGI Global, [2020]Online access: Click here to access online Availability: No items available :
    9.
    Handbook of research on machine and deep learning applications for cyber security Padmavathi Ganapathi and D. Shanmugapriya, editors.

    by Ganapathi, Padmavathi, 1964- | Shanmugapriya, D, 1978- | IGI Global [publisher.].

    Material type: Text Text; Format: available online remote; Literary form: Not fiction ; Audience: Specialized; Publisher: Hershey, PA IGI Global, [2020]Online access: EBSCOhost Availability: No items available :
    10.
    Industry of anonymity inside the business of cybercrime Jonathan Lusthaus.

    by Lusthaus, Jonathan, 1984-.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Cambridge, Massachusetts Harvard University Press, 2018Copyright date: ©2018Other title: Inside the business of cybercrime.Online access: Click here to access online Availability: No items available :
    11.
    White collar and financial crimes a casebook of fraudsters, scam artists, and corporate thieves Jennifer C. Noble.

    by Noble, Jennifer C.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Oakland, California University of California Press, [2021]Online access: Click here to access online Availability: No items available :
    12.
    Countering cyber attacks and preserving the integrity and availability of critical systems S. Geetha and Asnath Victy Phamila, editors.

    by Geetha, S, 1979- | Phamila, Asnath Victy, 1978-.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, [2019]Online access: EBSCOhost Availability: No items available :
    13.
    Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence [electronic resource].

    by Rawat, Romil | Telang, Shrikant | William, P | Kaur, Upinder | C.U., Om Kumar.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Hershey IGI Global, 2022Online access: EBSCOhost Availability: No items available :
    14.
    Practical cyber intelligence how action-based intelligence can be an effective response to incidents Wilson Bautista Jr.

    by Bautista, Wilson, Jr.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Birmingham, UK Packt Publishing, 2018Online access: EBSCOhost Availability: No items available :
    15.
    Corporate Control of White-Collar Crime A Bottom-Up Approach to Executive Deviance Petter Gottschalk.

    by Gottschalk, Petter, 1950-.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Berlin ; Boston Walter de Gruyter GmbH, [2022]Online access: EBSCOhost Availability: No items available :
    16.
    Research anthology on securing mobile technologies and applications Information Resource Management Association, USA.

    by Information Resources Management Association [editor.].

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, an imprint of IGI Global, [2021]Online access: Click here to access online Availability: No items available :
    17.
    Global perspectives on victimization analysis and prevention Johnson Oluwole Ayodele.

    by Ayodele, Johnson Oluwole, 1954-.

    Series: Advances in criminology, victimology, serial violence, and the deep web (ACVSVDW) book seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, and imprint of IGI Global, [2020]Online access: Click here to access online Availability: No items available :
    18.
    Cyberhate the far right in the digital age edited by James Bacigalupo, Kevin Borgeson, Robin Maria Valeri.

    by Bacigalupo, James, 1987- | Borgeson, Kevin | Valeri, Robin Maria.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Lanham Lexington Books, 2022Other title: Cyber hate.Online access: Click here to access online Availability: No items available :
    19.
    Digital forensics and incident response incident response techniques and procedures to respond to modern cyber threats Gerard Johansen.

    by Johansen, Gerard.

    Edition: Second edition.Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Birmingham Packt Publishing Ltd., 2020Online access: EBSCOhost Availability: No items available :
    20.
    Ethical hacking techniques and countermeasures for cybercrime prevention Nabie Y. Conteh.

    by Conteh, Nabie, 1960-.

    Series: Advances in information security, privacy, and ethics (AISPE) book seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, an imprint of IGI Global, [2021]Online access: EBSCOhost Availability: No items available :
    21.
    Cyber security and threats concepts, methodologies, tools, and applications Information Resources Management Association, editor.

    by Information Resources Management Association [editor.].

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, 2018Other title: Cybersecurity and threats.Online access: EBSCOhost Availability: No items available :
    22.
    Cybersecurity crisis management and lessons learned from the Covid-19 pandemic Ryma Abassi, Aida Ben Chehida Douss.

    by Abassi, Ryma, 1980- | Ben Chehida Douss, Aida, 1986-.

    Series: Advances in information security, privacy, and ethics (AISPE) book seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey, PA Information Science Reference, an imprint of IGI Global, [2022]Online access: EBSCOhost Availability: No items available :
    23.
    Handbook of research on cyber law, data protection, and privacy Nisha Dhanraj Dewani, Zubair Ahmed Khan, Aarushi Agarwal, Mamta Sharma, and Shaharyar Asaf Khan, editors.

    by Dewani, Nisha Dhanraj, 1985- | Khan, Zubair Ahmed, 1985- | Agarwal, Aarushi, 1988- | Sharma, Mamta, 1974- | Khan, Shaharyar Asaf, 1983-.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Hershey PA Information Science Reference, (an imprint of IGI Global), [2022]Online access: EBSCOhost Availability: No items available :
    24.
    Hacked a radical approach to hacker culture and crime Kevin F. Steinmetz.

    by Steinmetz, Kevin F.

    Series: Alternative criminology seriesMaterial type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: New York New York University Press, [2016]Online access: EBSCOhost Availability: No items available :
    25.
    The voices of #MeToo from grassroots activism to a viral roar Carly Gieseler.

    by Gieseler, Carly, 1978-.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publisher: Lanham Rowman & Littlefield, [2019]Other title: Voices of hashtag MeToo.Online access: EBSCOhost Availability: No items available :
    26.
    Research Anthology on Business Aspects of Cybersecurity [electronic resource].

    by Management Association, Information Resources.

    Material type: Text Text; Format: available online remote; Literary form: Not fiction Publication details: Hershey IGI Global, 2021Online access: EBSCOhost Availability: No items available :