Free Shipping Worldwide | Members get 10% extra.


Shipping & Delivery

Shipping Rates can ship to virtually any address in the world. Please check on this page for more information on costs and delivery times. Interested in free shipping? Learn about our FREE Shipping .

Shipping Method Delivery Estimate First Item Charge Each Aditional Item
Free! Standard 6-16 Days Free for order above $30 Free for order above $30
Standard 6-16 Days $ 7.00 $ 5.00
Trackable Expedited 4-6 Days $ 12.00 $ 8.00
Trackable Express 2-3 Days $ 30.00 $ 25.00

When my order will arrive?

It really depends on the item -- you can see the relevant info on its page. You'll get a email when your item has been shipped. can ship to virtually any address in the world. Once your order has been shipped, we offer the following times for delivery in business days (Mon-Fri):

Australia and New Zealand 7-12 business days
Middle East and Gulf 7-12 business days
Singapore & Hong Kong 7-10 business days
United Kingdom 7-10 business days
Europe 7-12 business days
USA and Canada 7-15 business days
South America 7-18 business days
All other countries 7-15 business days

Dimensions of Cyber Crime

Authors (s): S R Sharma (Editor)
Format: Hardcover
ISBN-10: 8126115416
Pages: viii+436p., 22cm.
Pub. date: 01.01.2004, 1st ed.
Publisher: Anmol Publications Pvt. Ltd.
Language (s): English
Bagchee ID: BB28078
List price: US $ 60,00
Bagchee price: US $ 54,00
You save: (10.00%)
Member price: US $ 48,60 info

Overview for Dimensions of Cyber Crime

In the age of computer and Internet cyber crimes have emerged on the scence which requires special techniques of investigation and detection. The present work highlights some important issues on the topic, e.g. Finding Network Operating System and Operating System Weaknesses; Sources of leaks in LANs and WANs; Creating a Network Security Policy; Managing NDS Security; Network Services; Transmission Media and Connections; Nature of Computer Crime; Computer Fraud; Hacking Illegal Access to Computer Material; Unauthorised Modification of Computer Programs of Data: A Case Study; Piracy and Other Offences; Computer Crime--Concluding Remarks; Introduction and Background to the Data Protection Act 1998: A Case Study; Data Controllers and the Data Protection Act 1998: A Case Study; Data Subjects' Right; and Data Privacy in Telecommunications etc.
Write your own review
  • There are no reviews yet. Be the first to write one