Search Results for Computer crimes. - Narrowed by: Online Library SirsiDynix Enterprise https://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026pe$003dd$00253A$0026ps$003d300? 2024-11-10T11:42:05Z Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimes ent://SD_ILS/0/SD_ILS:285174 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Marcella, Albert J.&#160;Menendez, Doug.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439848234">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimes ent://SD_ILS/0/SD_ILS:285590 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Marcella, Albert J.&#160;Greenfield, Robert S., 1961-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420000115">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Secure Computing A Concise Module ent://SD_ILS/0/SD_ILS:520590 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520590.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-31906-8">https://doi.org/10.1007/978-3-031-31906-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Ethical and Social Issues in the Information Age ent://SD_ILS/0/SD_ILS:520570 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Kizza, Joseph Migga. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;XX(520570.1)<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-031-24863-4">https://doi.org/10.1007/978-3-031-24863-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> National security : breakthroughs in research and practice ent://SD_ILS/0/SD_ILS:482109 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber law, privacy, and security : concepts, methodologies, tools, and applications ent://SD_ILS/0/SD_ILS:482239 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;IGI Global, publisher.&#160;Information Resources Management Association, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10&ndash;14, 2018, Proceedings, Part III ent://SD_ILS/0/SD_ILS:482971 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Brefeld, Ulf. editor.&#160;Curry, Edward. editor.&#160;Daly, Elizabeth. editor.&#160;MacNamee, Brian. editor. (orcid)0000-0003-2518-0274&#160;Marascu, Alice. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6&ndash;7, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483391 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683&#160;Cuppens, Fr&eacute;d&eacute;ric. editor.&#160;Cuppens, Nora. editor.&#160;Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814&#160;Ant&oacute;n, Annie. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The Art of War for Computer Security ent://SD_ILS/0/SD_ILS:483808 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Madsen, Tom. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Security ent://SD_ILS/0/SD_ILS:484201 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Pelton, Joseph N. author.&#160;Singh, Indu B. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologies ent://SD_ILS/0/SD_ILS:484275 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Gritzalis, Dimitris. editor.&#160;Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746&#160;Stergiopoulos, George. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedings ent://SD_ILS/0/SD_ILS:486312 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Yoo, Chang D. editor.&#160;Shi, Yun-Qing. editor.&#160;Kim, Hyoung Joong. editor.&#160;Piva, Alessandro. editor. (orcid)0000-0002-3047-0519&#160;Kim, Gwangsu. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security and Privacy Trends in the Industrial Internet of Things ent://SD_ILS/0/SD_ILS:486998 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28&ndash;29, 2019, Revised Selected Papers ent://SD_ILS/0/SD_ILS:483478 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Peterson, Gilbert. editor.&#160;Shenoi, Sujeet. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteraction ent://SD_ILS/0/SD_ILS:483593 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Flammini, Francesco. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Security ent://SD_ILS/0/SD_ILS:483947 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X&#160;Cybenko, George. editor.&#160;Liu, Peng. editor.&#160;Wang, Cliff. editor.&#160;Wellman, Michael. editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:484061 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Luiijf, Eric. editor. (orcid)0000-0002-1821-9890&#160;&#381;utautait&#279;, Inga. editor. (orcid)0000-0002-6073-2823&#160;H&auml;mmerli, Bernhard M. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19&ndash;20, 2019, Proceedings ent://SD_ILS/0/SD_ILS:485414 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Perdisci, Roberto. editor.&#160;Maurice, Cl&eacute;mentine. editor. (orcid)0000-0002-8896-9494&#160;Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017&#160;Almgren, Magnus. editor. (orcid)0000-0002-3383-9617&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Deep Learning Applications for Cyber Security ent://SD_ILS/0/SD_ILS:486694 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704&#160;Tang, MingJian. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Global cyber security labor shortage and international business risk ent://SD_ILS/0/SD_ILS:481810 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Christiansen, Bryan, 1960- editor.&#160;Piekarz, Agnieszka, 1990- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning and cognitive science applications in cyber security ent://SD_ILS/0/SD_ILS:482151 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Khan, Muhammad Salman, author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Countering cyber attacks and preserving the integrity and availability of critical systems ent://SD_ILS/0/SD_ILS:482177 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Geetha, S., 1979- editor.&#160;Phamila, Asnath Victy, 1978- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunities ent://SD_ILS/0/SD_ILS:482113 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Gunasekhar, T., 1990- author.&#160;Rao, K. Thirupathi, author.&#160;Kiran, P. Sai, author.&#160;Krishna Reddy, V., author.&#160;Rao, B. Thirumala, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crime ent://SD_ILS/0/SD_ILS:483013 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberdanger Understanding and Guarding Against Cybercrime ent://SD_ILS/0/SD_ILS:485936 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Willems, Eddy. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papers ent://SD_ILS/0/SD_ILS:485944 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Cybenko, George. editor. (orcid)0000-0001-7734-2912&#160;Pym, David. editor. (orcid)0000-0002-6504-5838&#160;Fila, Barbara. editor. (orcid)0000-0002-1824-7621&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, Le&oacute;n, Spain, September 4&ndash;6, 2019, Proceedings ent://SD_ILS/0/SD_ILS:487006 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;P&eacute;rez Garc&iacute;a, Hilde. editor. (orcid)0000-0001-7112-1983&#160;S&aacute;nchez Gonz&aacute;lez, Lidia. editor. (orcid)0000-0002-0760-1170&#160;Castej&oacute;n Limas, Manuel. editor. (orcid)0000-0002-5152-4555&#160;Quinti&aacute;n Pardo, H&eacute;ctor. editor. (orcid)0000-0002-0268-7999&#160;Corchado Rodr&iacute;guez, Emilio. editor. (orcid)0000-0001-8560-3991<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:398966 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Lin, Xiaodong. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:399039 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Nicholson, Denise. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:401736 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Iorliam, Aamo. author.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Analyzing human behavior in cyberspace ent://SD_ILS/0/SD_ILS:481930 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Yan, Zheng, 1958- editor.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:400943 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Bokhari, M. U. editor.&#160;Agrawal, Namrata. editor.&#160;Saini, Dharmendra. editor.&#160;SpringerLink (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile network forensics : emerging research and opportunities ent://SD_ILS/0/SD_ILS:481796 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Sharevski, Filipo, 1985- author.&#160;IGI Global, publisher.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Implementing digital forensic readiness : from reactive to proactive process ent://SD_ILS/0/SD_ILS:458771 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Sachowski, Jason, author.&#160;Ivtchenko, Dmitri, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044544">https://www.sciencedirect.com/science/book/9780128044544</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:458777 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> OS X incident response : scripting and analysis ent://SD_ILS/0/SD_ILS:458869 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Bradley, Jaron, author.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybervetting : Internet searches for vetting, investigations, and open-source intelligence ent://SD_ILS/0/SD_ILS:356418 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Appel, Edward J., author.<br/>Preferred Shelf Number&#160;ONLINE(356418.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack : the v3rb0ten network ent://SD_ILS/0/SD_ILS:458624 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Street, Jayson E., author.&#160;Sims, Kristin, author.&#160;Baskin, Brian, author.&#160;Martin, Brian, editor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:342886 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;DeFranco, Joanna F., author.<br/>Preferred Shelf Number&#160;ONLINE(342886.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber reconnaissance, surveillance, and defense ent://SD_ILS/0/SD_ILS:355450 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Shimonski, Robert.<br/>Preferred Shelf Number&#160;ONLINE(355450.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cloud Storage Forensics ent://SD_ILS/0/SD_ILS:356132 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Quick, Darren, author.&#160;Martini, Ben, 1990- author.&#160;Choo, Kim-Kwang Raymond, author.<br/>Preferred Shelf Number&#160;ONLINE(356132.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199705">http://www.sciencedirect.com/science/book/9780124199705</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Social networking as a criminal enterprise ent://SD_ILS/0/SD_ILS:356354 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Marcum, Catherine Davis, 1980- editor.&#160;Higgins, George E., editor.<br/>Preferred Shelf Number&#160;ONLINE(356354.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466589827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and cyberwarfare ent://SD_ILS/0/SD_ILS:341980 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Bernik, Igor, author.<br/>Preferred Shelf Number&#160;ONLINE(341980.1)<br/>Electronic Access&#160;John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber threat! : how to manage the growing risk of cyber attacks ent://SD_ILS/0/SD_ILS:342020 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number&#160;ONLINE(342020.1)<br/>Electronic Access&#160;ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a> Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a> John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a> MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a> Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber crime and cyber terrorism investigator's handbook ent://SD_ILS/0/SD_ILS:355653 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Akhgar, Babak.&#160;Staniforth, Andrew.&#160;Bosco, Francesca.<br/>Preferred Shelf Number&#160;ONLINE(355653.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007433">http://www.sciencedirect.com/science/book/9780128007433</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:355829 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Messier, Ric, author.<br/>Preferred Shelf Number&#160;ONLINE(355829.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Targeted cyber attacks : multi-staged attacks driven by exploits and malware ent://SD_ILS/0/SD_ILS:355853 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Sood, Aditya K., author.&#160;Enbody, Richard J., author.<br/>Preferred Shelf Number&#160;ONLINE(355853.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:355909 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carvey, Harlan A., author.<br/>Preferred Shelf Number&#160;ONLINE(355909.1)<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:286248 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Doherty, Eamon P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439898789">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigating computer-related crime ent://SD_ILS/0/SD_ILS:289392 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Stephenson, Peter.&#160;Gilbert, Keith, 1988-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420003703">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:260674 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Leman-Langlois, St&eacute;phane, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber power : crime, conflict and security in cyberspace ent://SD_ILS/0/SD_ILS:342598 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Ghernaouti-H&eacute;lie, Solange, 1958- author.<br/>Preferred Shelf Number&#160;ONLINE(342598.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:146917 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;O'Connor, T. J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics processing and procedures meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements ent://SD_ILS/0/SD_ILS:306694 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Watson, David (David Lilburn)&#160;Jones, Andrew.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497428">http://www.sciencedirect.com/science/book/9781597497428</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of web hacking tools and techniques to attack the Web ent://SD_ILS/0/SD_ILS:306699 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Pauli, Joshua J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybersecurity public sector threats and responses ent://SD_ILS/0/SD_ILS:286202 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Andreasson, Kim J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware forensics field guide for Windows dystems digital forensics field guides ent://SD_ILS/0/SD_ILS:147898 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Malin, Cameron H.&#160;Casey, Eoghan.&#160;Aquilina, James M.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:276700 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and the law challenges, issues, and outcomes ent://SD_ILS/0/SD_ILS:241821 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Brenner, Susan W., 1947-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wiki at war conflict in a socially networked world ent://SD_ILS/0/SD_ILS:241837 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carafano, James Jay, 1955-&#160;Project Muse.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyberbullying prevention and response : expert perspectives ent://SD_ILS/0/SD_ILS:261362 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Patchin, Justin W., 1977-&#160;Hinduja, Sameer, 1978-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://www.tandfebooks.com/isbn/9780203818312">Click here to view</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of digital forensics the primer for getting started in digital forensics ent://SD_ILS/0/SD_ILS:145235 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Sammons, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496612">http://www.sciencedirect.com/science/book/9781597496612</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis toolkit advanced analysis techniques for Windows 7 ent://SD_ILS/0/SD_ILS:145689 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carvey, Harlan A.&#160;Kolde, Jennifer.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Network intrusion analysis methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:146274 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Fichera, Joe, 1966-&#160;Bolt, Steven.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hacking web apps detecting and preventing web application security problems ent://SD_ILS/0/SD_ILS:148161 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Shema, Mike.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Security metrics a beginner's guide ent://SD_ILS/0/SD_ILS:293238 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Wong, Caroline.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and espionage an analysis of subversive multi-vector threats ent://SD_ILS/0/SD_ILS:147518 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Gragido, Will.&#160;Pirc, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> FISMA principles and best practices beyond compliance ent://SD_ILS/0/SD_ILS:290654 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Howard, Patrick D.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Internet searches for vetting, investigations, and open-source intelligence ent://SD_ILS/0/SD_ILS:291640 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Appel, Edward J.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439827529">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing the risk of fraud and misconduct meeting the challenges of a global, regulated, and digital environment ent://SD_ILS/0/SD_ILS:292904 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Girgenti, Richard H.&#160;Hedley, Timothy P.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/managing-risk-fraud-misconduct-meeting-challenges-global-regulated-digital-environment">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> IT security metrics a practical framework for measuring security &amp; protecting data ent://SD_ILS/0/SD_ILS:293294 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Hayden, Lance.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber Criminals on Trial ent://SD_ILS/0/SD_ILS:238550 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Smith, Russell G..&#160;Grabosky, Peter.&#160;Urbas, Gregor.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://dx.doi.org/10.1017/CBO9780511481604">Access by subscription</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber criminology exploring Internet crimes and criminal behavior ent://SD_ILS/0/SD_ILS:285180 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Jaishankar, K.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439829509">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Machine learning forensics for law enforcement, security, and intelligence ent://SD_ILS/0/SD_ILS:285221 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Mena, Jesus.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Xbox 360 forensics a digital forensics guide to examining artifacts ent://SD_ILS/0/SD_ILS:306525 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Bolt, Steven.&#160;Liles, Samuel.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496230">http://www.sciencedirect.com/science/book/9781597496230</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Android forensics investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:145253 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Hoog, Andrew.&#160;McCash, John.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry. ent://SD_ILS/0/SD_ILS:145659 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carvey, Harlan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. ent://SD_ILS/0/SD_ILS:146500 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Altheide, Cory.&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495868">http://www.sciencedirect.com/science/book/9781597495868</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Gray hat hacking the ethical hacker's handbook ent://SD_ILS/0/SD_ILS:293255 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Harris, Shon.&#160;Harper, Allen.&#160;Eagle, Chris.&#160;Ness, Jonathan.&#160;Lenkey, Gideon.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Principles of cybercrime ent://SD_ILS/0/SD_ILS:277995 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Clough, Jonathan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Seven deadliest social network attacks ent://SD_ILS/0/SD_ILS:149145 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Timm, Carl.&#160;Perez, Richard, 1969 Oct. 17-&#160;Ely, Adam.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of digital forensics and investigation ent://SD_ILS/0/SD_ILS:153295 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Casey, Eoghan.&#160;Altheide, Cory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329101">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329101</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:306330 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The basics of hacking and penetration testing ethical hacking and penetration testing made easy ent://SD_ILS/0/SD_ILS:145199 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Dissecting the hack the forb1dd3n network ent://SD_ILS/0/SD_ILS:146585 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Street, Jayson E.&#160;Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:146482 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Lillard, Terrence.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Digital triage forensics processing the digital crime scene ent://SD_ILS/0/SD_ILS:146672 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Pearson, Stephen, 1963-&#160;Watson, Richard.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495967">http://www.sciencedirect.com/science/book/9781597495967</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Virtualization and forensics a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:146715 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Barrett, Diane.&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Handbook of digital forensics and investigation ent://SD_ILS/0/SD_ILS:148173 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Casey, Eoghan.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123742674">http://www.sciencedirect.com/science/book/9780123742674</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Profiling hackers the science of criminal profiling as applied to the world of hacking ent://SD_ILS/0/SD_ILS:291412 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Chiesa, Raoul, 1973-&#160;Ducci, Stefania.&#160;Ciappi, Silvio, 1965-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:146413 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Dunham, Ken.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cisco router and switch forensics investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:148703 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Liu, Dale.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber fraud tactics, techniques, and procedures ent://SD_ILS/0/SD_ILS:291467 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Graham, James.&#160;Howard, Rick.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malware forensics investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:147914 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Aquilina, James M.&#160;Casey, Eoghan.&#160;Malin, Cameron H.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scene of the cybercrime ent://SD_ILS/0/SD_ILS:148955 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Cross, Michael, 1965-&#160;Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Malicious bots an inside look into the cyber-criminal underground of the internet ent://SD_ILS/0/SD_ILS:288747 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Dunham, Ken.&#160;Melnick, Jim.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420069068">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Insider computer fraud an in-depth framework for detecting and defending against insider IT attacks ent://SD_ILS/0/SD_ILS:291349 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Brancik, Kenneth C.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:297432 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Dube, Roger.&#160;Wiley InterScience (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a> John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a> MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a> Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:148388 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Kleiman, Dave.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROI ent://SD_ILS/0/SD_ILS:289360 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Herrmann, Debra S.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Wireless crime and forensic investigation ent://SD_ILS/0/SD_ILS:290328 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Kipper, Gregory.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420013016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors ent://SD_ILS/0/SD_ILS:147642 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Reyes, Anthony.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491334">http://www.sciencedirect.com/science/book/9781597491334</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:148564 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Wiles, Jack.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> CD and DVD forensics ent://SD_ILS/0/SD_ILS:148800 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Crowley, Paul.&#160;Kleiman, Dave.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491280">http://www.sciencedirect.com/science/book/9781597491280</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alternate data storage forensics ent://SD_ILS/0/SD_ILS:112144 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Schroader, Amber.&#160;Cohen, Tyler.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491631">http://www.sciencedirect.com/science/book/9781597491631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutors ent://SD_ILS/0/SD_ILS:112157 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Reyes, Anthony.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491334">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:112206 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Kleiman, Dave.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:112211 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carvey, Harlan A.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:112214 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Winkler, Ira.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> The best damn cybercrime and digital forensics book period ent://SD_ILS/0/SD_ILS:145197 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Cardwell, Kevin.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492287">http://www.sciencedirect.com/science/book/9781597492287</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Alternate data storage forensics ent://SD_ILS/0/SD_ILS:145233 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Schroader, Amber.&#160;Cohen, Tyler.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491631">http://www.sciencedirect.com/science/book/9781597491631</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Windows forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:145678 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Carvey, Harlan A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Zen and the art of information security ent://SD_ILS/0/SD_ILS:145680 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Winkler, Ira.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensic computer crime investigation ent://SD_ILS/0/SD_ILS:288568 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Johnson, Thomas Alfred.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420028379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cybercrime and society ent://SD_ILS/0/SD_ILS:368078 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Yar, Majid.<br/>Preferred Shelf Number&#160;ONLINE(368078.1)<br/>Electronic Access&#160;SAGE knowledge <a href="http://sk.sagepub.com/books/cybercrime-and-society">http://sk.sagepub.com/books/cybercrime-and-society</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:148488 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Maynor, David.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Syngress force emerging threat analysis from mischief to malicious ent://SD_ILS/0/SD_ILS:112202 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Maynor, David.&#160;ScienceDirect (Online service)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Cyber crime investigator's field guide ent://SD_ILS/0/SD_ILS:284823 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Middleton, Bruce.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420031324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Black Hat physical device security exploiting hardware and software ent://SD_ILS/0/SD_ILS:254025 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Miller, Drew, 1978-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Stealing the network how to own an identity ent://SD_ILS/0/SD_ILS:253663 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Alder, Raven.&#160;Mullen, Timothy M.&#160;Long, Johnny.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:253664 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Craig, Paul.&#160;Honick, Ron.&#160;Burnett, Mark (Mark M.)<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Forensic computer crime investigation ent://SD_ILS/0/SD_ILS:342854 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Johnson, Thomas Alfred.<br/>Preferred Shelf Number&#160;ONLINE(342854.1)<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781466522602">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Inside the spam cartel trade secrets from the dark side ent://SD_ILS/0/SD_ILS:254028 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Spammer-X.&#160;Sjouwerman, Stu.&#160;Posluns, Jeffrey.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266863">http://www.sciencedirect.com/science/book/9781932266863</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Managing a network vulnerability assessment ent://SD_ILS/0/SD_ILS:289185 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Peltier, Thomas R.&#160;Peltier, Justin.&#160;Blackley, John A.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9780203503041">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Scene of the cybercrime computer forensics handbook ent://SD_ILS/0/SD_ILS:253615 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Shinder, Debra Littlejohn.&#160;Tittel, Ed.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Hack proofing your identity in the information age protect your family on the internet! ent://SD_ILS/0/SD_ILS:253617 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Bidwell, Teri.&#160;Cross, Michael, 1965-&#160;Russell, Ryan, 1969-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigating computer-related crime ent://SD_ILS/0/SD_ILS:288698 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Stephenson, Peter.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420048872">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Transnational criminal organizations, cybercrime, and money laundering a handbook for law enforcement officers, auditors, and financial investigators ent://SD_ILS/0/SD_ILS:289590 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Richards, James R., 1960-<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420048728">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/> Investigating computer crime ent://SD_ILS/0/SD_ILS:288646 2024-11-10T11:42:05Z 2024-11-10T11:42:05Z Author&#160;Clark, Franklin.&#160;Diliberto, Ken.<br/>Preferred Shelf Number&#160;ONLINE<br/>Electronic Access&#160;<a href="http://marc.crcnetbase.com/isbn/9781420048896">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format:&#160;Electronic Resources<br/>Availability&#160;Online Library~1<br/>