Show simple item record

Computer crime

dc.contributor.authorAl Fazzani, Ibrahim
dc.contributor.authorAl Fazzani, Ibrahim
dc.date.accessioned2021-02-22T07:05:44Z
dc.date.available2021-02-22T07:05:44Z
dc.date.issued2020-12-11
dc.identifier.urihttp://repository.limu.edu.ly/handle/123456789/2713
dc.description.abstract1/LIST TYPES OF CRIME Unauthorized access malware, including spyware and viruses rogue programs such as time bombs, logic bombs, worms, and Trojan horses fraud and theft (password theft)en_US
dc.language.isoenen_US
dc.publisherThe Libyan International Medical University - Faculty Of Information Technologyen_US
dc.rightsCC0 1.0 Universal*
dc.rights.urihttp://creativecommons.org/publicdomain/zero/1.0/*
dc.subjectComputer crimeen_US
dc.titleComputer crimeen_US
dc.typeWorking Paperen_US


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record

CC0 1.0 Universal
Except where otherwise noted, this item's license is described as CC0 1.0 Universal