Computer crime
dc.contributor.author | Al Fazzani, Ibrahim | |
dc.contributor.author | Al Fazzani, Ibrahim | |
dc.date.accessioned | 2021-02-22T07:05:44Z | |
dc.date.available | 2021-02-22T07:05:44Z | |
dc.date.issued | 2020-12-11 | |
dc.identifier.uri | http://repository.limu.edu.ly/handle/123456789/2713 | |
dc.description.abstract | 1/LIST TYPES OF CRIME Unauthorized access malware, including spyware and viruses rogue programs such as time bombs, logic bombs, worms, and Trojan horses fraud and theft (password theft) | en_US |
dc.language.iso | en | en_US |
dc.publisher | The Libyan International Medical University - Faculty Of Information Technology | en_US |
dc.rights | CC0 1.0 Universal | * |
dc.rights.uri | http://creativecommons.org/publicdomain/zero/1.0/ | * |
dc.subject | Computer crime | en_US |
dc.title | Computer crime | en_US |
dc.type | Working Paper | en_US |