Victimology: The Essentials Submitted by jhills on Mon, 01/08/2024 - 09:13 Read more about Victimology: The Essentials
From Crime Policy to Victim Policy Submitted by jhills on Mon, 01/08/2024 - 09:12 Read more about From Crime Policy to Victim Policy
Countering Cyberterrorism Submitted by jhills on Mon, 01/08/2024 - 07:57 Read more about Countering Cyberterrorism
Strategic Engineering for Cloud Computing and Big Data Analytics Submitted by jhills on Mon, 01/08/2024 - 07:55 Read more about Strategic Engineering for Cloud Computing and Big Data Analytics
Deep fakes and the infocalypse: What you urgently need to know Submitted by jhills on Mon, 01/08/2024 - 07:52 Read more about Deep fakes and the infocalypse: What you urgently need to know
Terrorism in Cyberspace Submitted by jhills on Mon, 01/08/2024 - 07:50 Read more about Terrorism in Cyberspace
Click Here to Kill Everybody Submitted by jhills on Mon, 01/08/2024 - 07:48 Read more about Click Here to Kill Everybody
Hacktivism and Cyberwars Submitted by jhills on Mon, 01/08/2024 - 07:38 Read more about Hacktivism and Cyberwars