<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Αποτελέσματα για "Computer crimes."</title>
    <description>Εμφανίζονται 1-28 από 28</description>
    <generator>Zend_Feed_Writer 2 (http://framework.zend.com)</generator>
    <link>http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Computer+crimes.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50</link>
    <opensearch:totalResults>28</opensearch:totalResults>
    <opensearch:startIndex>0</opensearch:startIndex>
    <opensearch:itemsPerPage>50</opensearch:itemsPerPage>
    <opensearch:Query role="request" searchTerms="&quot;Computer crimes.&quot;" startIndex="0"/>
    <atom:link rel="first" type="application/rss+xml" href="http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Computer+crimes.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <atom:link rel="last" type="application/rss+xml" href="http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Computer+crimes.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <atom:link rel="self" type="application/rss+xml" href="http://okeanos.lib.unipi.gr/Search/Results?lookfor=%22Computer+crimes.%22&amp;type=Subject&amp;sort=last_indexed+desc&amp;limit=50&amp;view=rss"/>
    <item>
      <title>Tangled web : tales of digital crime from the shadows of cyberspace /</title>
      <pubDate>Sat, 01 Jan 2000 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F18074</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F18074</guid>
      <author>Power, Richard, 1953-</author>
      <dc:format>Book</dc:format>
      <dc:date>2000</dc:date>
      <dc:creator>Power, Richard, 1953-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyberpunk : outlaws and hackers on the computer frontier /</title>
      <pubDate>Tue, 01 Jan 1991 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F123</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F123</guid>
      <author>Hafner, Katie.</author>
      <dc:format>Book</dc:format>
      <dc:date>1991</dc:date>
      <dc:creator>Hafner, Katie.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Incident response : investigating computer crime /</title>
      <pubDate>Mon, 01 Jan 2001 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F18774</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F18774</guid>
      <author>Proside, Chris.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Proside, Chris.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Information warfare : how to survive cyber attacks /</title>
      <pubDate>Mon, 01 Jan 2001 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F18977</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F18977</guid>
      <author>Erbschloe, Michael.</author>
      <dc:format>Book</dc:format>
      <dc:date>2001</dc:date>
      <dc:creator>Erbschloe, Michael.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Intrusion detection in distributed systems : an abstraction-based approach /</title>
      <pubDate>Thu, 01 Jan 2004 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F20856</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F20856</guid>
      <author>Ning, Peng.</author>
      <dc:format>Book</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Ning, Peng.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Computer crime /</title>
      <pubDate>Sun, 01 Jan 1978 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F22205</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F22205</guid>
      <author>Bequai, Augut.</author>
      <dc:format>Book</dc:format>
      <dc:date>1978</dc:date>
      <dc:creator>Bequai, Augut.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>DDOS - Distributed Denial of Service Attack /</title>
      <pubDate>Tue, 01 Jan 2008 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F34940</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F34940</guid>
      <author>Φούτρη, Παρασκευά.</author>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Φούτρη, Παρασκευά.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Η αντιμετώπιση της κυβερνοτρομοκρατίας (cyber terorrism) με χρήση μεθόδων ηλεκτρονικής παραπλάνησης /</title>
      <pubDate>Tue, 01 Jan 2008 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F37939</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F37939</guid>
      <author>Μουρτζάκης, Εμμανουήλ.</author>
      <dc:format>Book</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Μουρτζάκης, Εμμανουήλ.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Malware forensics investigating and analyzing malicious code /</title>
      <pubDate>Tue, 01 Jan 2008 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F38006</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F38006</guid>
      <author>Aquilina, James M.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Aquilina, James M.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Zen and the art of information security</title>
      <pubDate>Mon, 01 Jan 2007 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F38243</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F38243</guid>
      <author>Winkler, Ira.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2007</dc:date>
      <dc:creator>Winkler, Ira.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Managing the human factor in information security : how to win over staff and influence business managers /</title>
      <pubDate>Thu, 01 Jan 2009 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F38440</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F38440</guid>
      <author>Lacey, David.</author>
      <dc:format>Book</dc:format>
      <dc:date>2009</dc:date>
      <dc:creator>Lacey, David.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors /</title>
      <pubDate>Mon, 01 Jan 2007 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F36734</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F36734</guid>
      <author>Reyes, Anthony.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2007</dc:date>
      <dc:creator>Reyes, Anthony.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Black Hat physical device security exploiting hardware and software /</title>
      <pubDate>Sat, 01 Jan 2005 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F44637</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F44637</guid>
      <author>Miller, Drew, 1978-</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Miller, Drew, 1978-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Hack proofing your identity in the information age protect your family on the internet! /</title>
      <pubDate>Tue, 01 Jan 2002 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F44878</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F44878</guid>
      <author>Bidwell, Teri.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Bidwell, Teri.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Inside the spam cartel trade secrets from the dark side /</title>
      <pubDate>Thu, 01 Jan 2004 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F44934</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F44934</guid>
      <author>Spammer-X.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2004</dc:date>
      <dc:creator>Spammer-X.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Scene of the cybercrime computer forensics handbook /</title>
      <pubDate>Tue, 01 Jan 2002 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45262</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45262</guid>
      <author>Shinder, Debra Littlejohn.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2002</dc:date>
      <dc:creator>Shinder, Debra Littlejohn.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Scene of the cybercrime</title>
      <pubDate>Tue, 01 Jan 2008 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45263</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45263</guid>
      <author>Cross, Michael, 1965-</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2008</dc:date>
      <dc:creator>Cross, Michael, 1965-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Software piracy exposed</title>
      <pubDate>Sat, 01 Jan 2005 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45296</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45296</guid>
      <author>Craig, Paul.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <dc:creator>Craig, Paul.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Stealing the network how to own an identity /</title>
      <pubDate>Sat, 01 Jan 2005 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45309</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45309</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2005</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Εγκλήματα στο διαδίκτυο : εναλλακτικοί τρόποι εκδήλωσης, τρόποι αντιμετώπισης και διερεύνησής των /</title>
      <pubDate>Fri, 01 Jan 2010 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F41279</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F41279</guid>
      <author>Στούρη, Βασιλική.</author>
      <dc:format>Book</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Στούρη, Βασιλική.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Επιθέσεις Distributed Denial of Service (DDoS) και μέτρα προστασίας σε δίκτυα δεδομένων /</title>
      <pubDate>Fri, 01 Jan 2010 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F41283</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F41283</guid>
      <author>Καραμάνης, Νικόλαος.</author>
      <dc:format>Book</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Καραμάνης, Νικόλαος.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Vulnerability assessment των servers unipi.gr and dtps.unipi.gr /</title>
      <pubDate>Fri, 01 Jan 2010 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F41319</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F41319</guid>
      <author>Φιτσιάλης, Χρήστος.</author>
      <dc:format>Book</dc:format>
      <dc:date>2010</dc:date>
      <dc:creator>Φιτσιάλης, Χρήστος.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Εγκλήματα στο διαδίκτυο : εναλλακτικοί τρόποι εκδήλωσης, τρόποι αντιμετώπισης και διερεύνησή των /</title>
      <pubDate>Sat, 01 Jan 2011 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F41351</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F41351</guid>
      <author>Στεφανουδάκης, Μιχαήλ.</author>
      <dc:format>Book</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Στεφανουδάκης, Μιχαήλ.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Το έγκλημα στον κυβερνοχώρο : μορφές, αντιμετώπιση και νομική προστασία /</title>
      <pubDate>Sat, 01 Jan 2011 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F41402</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F41402</guid>
      <author>Παναγιωτίδης, Παναγιώτης Κ.</author>
      <dc:format>Book</dc:format>
      <dc:date>2011</dc:date>
      <dc:creator>Παναγιωτίδης, Παναγιώτης Κ.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Techno security's guide to e-discovery and digital forensics</title>
      <pubDate>Mon, 01 Jan 2007 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45330</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45330</guid>
      <dc:format>Electronic</dc:format>
      <dc:date>2007</dc:date>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The best damn cybercrime and digital forensics book period</title>
      <pubDate>Mon, 01 Jan 2007 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F45342</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F45342</guid>
      <author>Cardwell, Kevin.</author>
      <dc:format>Electronic</dc:format>
      <dc:date>2007</dc:date>
      <dc:creator>Cardwell, Kevin.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Η ηθική στο διαδίκτυο και το ηλεκτρονικό έγκλημα /</title>
      <pubDate>Mon, 01 Jan 2018 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F55667</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F55667</guid>
      <author>Παναγιωτακόπουλος, Χρήστος Θ., 1954-</author>
      <dc:format>Book</dc:format>
      <dc:date>2018</dc:date>
      <dc:creator>Παναγιωτακόπουλος, Χρήστος Θ., 1954-</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>The international handbook on computer crime : computer-related economic crime and the infringements of privacy /</title>
      <pubDate>Wed, 01 Jan 1986 18:02:23 +0200</pubDate>
      <link>http://okeanos.lib.unipi.gr/Record/1%2F7361</link>
      <guid>http://okeanos.lib.unipi.gr/Record/1%2F7361</guid>
      <author>Sieber, Ulrich, Dr.</author>
      <dc:format>Book</dc:format>
      <dc:date>1986</dc:date>
      <dc:creator>Sieber, Ulrich, Dr.</dc:creator>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
