Listing 1 - 10 of 14 | << page >> |
Sort by
|
Choose an application
Wearable Electronics and Health & Leisure Micro Nano sensor and BioMEMS IC Design and System Integration Multi core Processor and Reconfigurable Computing Cloud Computing & Internet of Things (IoT) Cryptographic Algorithm and Security Management Next Generation Networking and IPv6 Wireless Communication and Networking Engineering Cognitive Radio and Software Defined Radio EMC Theory and RFID Techniques Pattern Recognition and Applications.
Computer security --- Counterfeits and counterfeiting --- Prevention --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money
Choose an application
Counterfeits and counterfeiting --- Computer security --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Prevention
Choose an application
Paper money design --- -Counterfeits and counterfeiting --- -332.40440973 --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Bank notes --- Paper money --- Design --- Counterfeits and counterfeiting -- United States. --- Paper money design -- United States. --- Counterfeits and counterfeiting --- Finance --- Business & Economics
Choose an application
The books examines the financial and business structures of the counterfeiting business and considers how the internet and e-commerce present financial opportunities for counterfeiters. It explores 'organised crime' and criminal markets, digital technologies and cultural values and practices.
Product counterfeiting. --- Counterfeits and counterfeiting. --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Commercial product counterfeiting --- Counterfeiting of products --- Passing off (Product counterfeiting) --- Counterfeits and counterfeiting --- Product counterfeiting --- Law and legislation. --- Criminal law --- Competition, Unfair
Choose an application
Computer networks --- Counterfeits and counterfeiting --- Radio frequency identification systems --- Security measures --- Prevention --- Identification systems, Radio frequency --- RF/ID systems --- RFID systems --- Identification --- Radio telemetry --- Near-field communication --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Equipment and supplies
Choose an application
Computer networks --- Counterfeits and counterfeiting --- Radio frequency identification systems --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Security measures --- Prevention --- Identification systems, Radio frequency --- RF/ID systems --- RFID systems --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Identification --- Radio telemetry --- Near-field communication --- Forgery --- Money --- Equipment and supplies
Choose an application
Walk down any main street in Shanghai, Paris or New York and you will see evidence of the counterfeit goods trade. Everyone has seen or heard of fake Prada bags or Omega watches. But how large is the counterfeit market? It appears that the same numbers have been quoted repeatedly in sources ranging from serious academic journals to the BBC to the Sydney Morning Herald. This is the first book to fully examine the size of the counterfeit market. Many authors have proposed actions to combat counterfeiting. Chaudhry and Zimmerman are the first to take a global look at the intellectual property environment using a research-based approach. This book also gives international business managers practical, tested tools they can use to combat piracy. These recommendations are based on the successful experience of managers wrestling with these problems every day. The book is based on solid research but written in an accessible style.
Counterfeits and counterfeiting. --- Economics. --- Economic theory --- Political economy --- Social sciences --- Economic man --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Commerce. --- Commercial policy. --- Product counterfeiting --- Product counterfeiting. --- Handel in namaak. --- Internationale handel. --- Prevention. --- Economic theory. --- Commercial law. --- Economic Theory/Quantitative Economics/Mathematical Methods. --- Business Law. --- Commercial Law. --- Business --- Business law --- Commerce --- Law, Commercial --- Mercantile law --- Law --- Law merchant --- Maritime law --- Law and legislation
Choose an application
Bank notes --- -Counterfeits and counterfeiting --- -364.133 --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Bank bills --- Bank currency --- Banknotes --- Paper money --- Legal tender --- Forgeries --- -Prevention --- Counterfeits and counterfeiting -- United States. --- Criminal law. --- Electronic books. -- local. --- Counterfeits and counterfeiting --- Finance --- Business & Economics --- Prevention --- Crime --- Crimes and misdemeanors --- Criminals --- Law, Criminal --- Penal codes --- Penal law --- Law and legislation --- Legal status, laws, etc. --- Pleas of the crown --- Public law --- Criminal justice, Administration of --- Criminal procedure
Choose an application
Fraude --- Faux --- Crimes et criminels --- Forgery --- Identification cards --- Reproduction of money, documents, etc --- Counterfeits and counterfeiting --- Forgeries --- -Reproduction of money, documents, etc --- 343.92 --- Legal documents --- Money --- Cards, Identification --- Credentials (Identification cards) --- I.D. cards --- ID cards --- Identity cards --- IDs (Identification cards) --- Fraud --- Offenses against property --- Swindlers and swindling --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Counterfeits and counterfeiting. --- Forgery. --- Reproduction of money, documents, etc. --- Forgeries. --- Fake identification cards --- Forged identification cards --- Forgery of identification cards --- Phony identification cards --- Identification cards - Forgeries --- FRAUDES INFORMATIQUES --- CRIMINOLOGIE --- DROIT PENAL --- FAUX DOCUMENTS --- FRAUDE --- CARTES --- BANQUE --- IDENTITE
Choose an application
On the night of the 1876 presidential election, a gang of counterfeiters attempted to steal the entombed embalmed body of Abraham Lincoln and hold it for ransom. Craughwell returns to this bizarre, and largely forgotten, event with the first book to place the grave robbery in historical context. This rousing story of hapless con men, intrepid federal agents, and ordinary Springfield citizens offers an unusual glimpse into late-nineteenth-century America.
Grave robbing --- Crime and the press --- Counterfeits and counterfeiting --- Irish American criminals --- Coining, Illicit --- Counterfeit money --- Counterfeiting of money --- Illicit coining --- Forgery --- Money --- Grave robbery --- Robbing graves --- Theft --- Crime --- Crime reporting (Journalism) --- Press and crime --- Trial reporting --- Trials --- Trials in the press --- Press --- Free press and fair trial --- Criminals, Irish American --- Criminals --- History --- Press coverage --- Lincoln, Abraham, --- Linkŭln, Abrakham, --- Linkolʹn, Avraam, --- Linkūln, Ibrāhīm, --- Linkan, ʼAbrehām, --- Lincoln, A. --- Lin-kʻen, --- Linken, --- Lin, Kʻen, --- Lingkʻŏn, --- Lincoln, Abe, --- Liṅkan, Ēbrāhaṃ, --- Liṅkan, Abrahāṃ, --- לינקאלין, --- לינקאלן, אייברעהעם, --- לינקולן, אברהם --- 林肯, --- Liṅkana, Ābrāhama, --- Tomb. --- Family.
Listing 1 - 10 of 14 | << page >> |
Sort by
|