Search Results for Computer crimes. - Narrowed by: Online LibrarySirsiDynix Enterprisehttps://katalog.hacettepe.edu.tr/client/en_US/default/default/qu$003dComputer$002bcrimes.$0026qf$003dLIBRARY$002509Library$0025091$00253AONLINE$002509Online$002bLibrary$0026pe$003dd$00253A$0026ps$003d300?2024-11-10T11:42:05ZCyber forensics a field manual for collecting, examining, and preserving evidence of computer crimesent://SD_ILS/0/SD_ILS:2851742024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Marcella, Albert J. Menendez, Doug.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439848234">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber forensics a field manual for collecting, examining, and preserving evidence of computer crimesent://SD_ILS/0/SD_ILS:2855902024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Marcella, Albert J. Greenfield, Robert S., 1961-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420000115">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethical and Secure Computing A Concise Moduleent://SD_ILS/0/SD_ILS:5205902024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520590.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-31906-8">https://doi.org/10.1007/978-3-031-31906-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Ethical and Social Issues in the Information Ageent://SD_ILS/0/SD_ILS:5205702024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Kizza, Joseph Migga. author. SpringerLink (Online service)<br/>Preferred Shelf Number XX(520570.1)<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-031-24863-4">https://doi.org/10.1007/978-3-031-24863-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>National security : breakthroughs in research and practiceent://SD_ILS/0/SD_ILS:4821092024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7912-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber law, privacy, and security : concepts, methodologies, tools, and applicationsent://SD_ILS/0/SD_ILS:4822392024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor IGI Global, publisher. Information Resources Management Association, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8897-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine Learning and Knowledge Discovery in Databases European Conference, ECML PKDD 2018, Dublin, Ireland, September 10–14, 2018, Proceedings, Part IIIent://SD_ILS/0/SD_ILS:4829712024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Brefeld, Ulf. editor. Curry, Edward. editor. Daly, Elizabeth. editor. MacNamee, Brian. editor. (orcid)0000-0003-2518-0274 Marascu, Alice. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-10997-4">https://doi.org/10.1007/978-3-030-10997-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Computer Security ESORICS 2018 International Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4833912024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Katsikas, Sokratis K. editor. (orcid)0000-0003-2966-9683 Cuppens, Frédéric. editor. Cuppens, Nora. editor. Lambrinoudakis, Costas. editor. (orcid)0000-0002-6575-9814 Antón, Annie. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12786-2">https://doi.org/10.1007/978-3-030-12786-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The Art of War for Computer Securityent://SD_ILS/0/SD_ILS:4838082024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Madsen, Tom. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28569-2">https://doi.org/10.1007/978-3-030-28569-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Smart Cities of Today and Tomorrow Better Technology, Infrastructure and Securityent://SD_ILS/0/SD_ILS:4842012024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Pelton, Joseph N. author. Singh, Indu B. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95822-4">https://doi.org/10.1007/978-3-319-95822-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Infrastructure Security and Resilience Theories, Methods, Tools and Technologiesent://SD_ILS/0/SD_ILS:4842752024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Gritzalis, Dimitris. editor. Theocharidou, Marianthi. editor. (orcid)0000-0002-8870-1746 Stergiopoulos, George. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00024-0">https://doi.org/10.1007/978-3-030-00024-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital Forensics and Watermarking 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22-24, 2018, Proceedingsent://SD_ILS/0/SD_ILS:4863122024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Yoo, Chang D. editor. Shi, Yun-Qing. editor. Kim, Hyoung Joong. editor. Piva, Alessandro. editor. (orcid)0000-0002-3047-0519 Kim, Gwangsu. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-11389-6">https://doi.org/10.1007/978-3-030-11389-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security and Privacy Trends in the Industrial Internet of Thingsent://SD_ILS/0/SD_ILS:4869982024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Alcaraz, Cristina. editor. (orcid)0000-0003-0545-3191 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-12330-7">https://doi.org/10.1007/978-3-030-12330-7</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Digital Forensics XV 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papersent://SD_ILS/0/SD_ILS:4834782024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Peterson, Gilbert. editor. Shenoi, Sujeet. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-28752-8">https://doi.org/10.1007/978-3-030-28752-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Resilience of Cyber-Physical Systems From Risk Modelling to Threat Counteractionent://SD_ILS/0/SD_ILS:4835932024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Flammini, Francesco. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-95597-1">https://doi.org/10.1007/978-3-319-95597-1</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Adversarial and Uncertain Reasoning for Adaptive Cyber Defense Control- and Game-Theoretic Approaches to Cyber Securityent://SD_ILS/0/SD_ILS:4839472024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Jajodia, Sushil. editor. (orcid)0000-0003-3210-558X Cybenko, George. editor. Liu, Peng. editor. Wang, Cliff. editor. Wellman, Michael. editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-30719-6">https://doi.org/10.1007/978-3-030-30719-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Critical Information Infrastructures Security 13th International Conference, CRITIS 2018, Kaunas, Lithuania, September 24-26, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4840612024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Luiijf, Eric. editor. (orcid)0000-0002-1821-9890 Žutautaitė, Inga. editor. (orcid)0000-0002-6073-2823 Hämmerli, Bernhard M. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-05849-4">https://doi.org/10.1007/978-3-030-05849-4</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4854142024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Perdisci, Roberto. editor. Maurice, Clémentine. editor. (orcid)0000-0002-8896-9494 Giacinto, Giorgio. editor. (orcid)0000-0002-5759-3017 Almgren, Magnus. editor. (orcid)0000-0002-3383-9617 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-22038-9">https://doi.org/10.1007/978-3-030-22038-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Deep Learning Applications for Cyber Securityent://SD_ILS/0/SD_ILS:4866942024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Alazab, Mamoun. editor. (orcid)0000-0002-1928-3704 Tang, MingJian. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-13057-2">https://doi.org/10.1007/978-3-030-13057-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Global cyber security labor shortage and international business riskent://SD_ILS/0/SD_ILS:4818102024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Christiansen, Bryan, 1960- editor. Piekarz, Agnieszka, 1990- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5927-6</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning and cognitive science applications in cyber securityent://SD_ILS/0/SD_ILS:4821512024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Khan, Muhammad Salman, author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8100-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Countering cyber attacks and preserving the integrity and availability of critical systemsent://SD_ILS/0/SD_ILS:4821772024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Geetha, S., 1979- editor. Phamila, Asnath Victy, 1978- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-8241-0</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Detection and mitigation of insider attacks in a cloud infrastructure : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4821132024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Gunasekhar, T., 1990- author. Rao, K. Thirupathi, author. Kiran, P. Sai, author. Krishna Reddy, V., author. Rao, B. Thirumala, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7924-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity in Nigeria A Case Study of Surveillance and Prevention of Digital Crimeent://SD_ILS/0/SD_ILS:4830132024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15210-9">https://doi.org/10.1007/978-3-030-15210-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberdanger Understanding and Guarding Against Cybercrimeent://SD_ILS/0/SD_ILS:4859362024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Willems, Eddy. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-04531-9">https://doi.org/10.1007/978-3-030-04531-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Graphical Models for Security 5th International Workshop, GraMSec 2018, Oxford, UK, July 8, 2018, Revised Selected Papersent://SD_ILS/0/SD_ILS:4859442024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Cybenko, George. editor. (orcid)0000-0001-7734-2912 Pym, David. editor. (orcid)0000-0002-6504-5838 Fila, Barbara. editor. (orcid)0000-0002-1824-7621 SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-15465-3">https://doi.org/10.1007/978-3-030-15465-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hybrid Artificial Intelligent Systems 14th International Conference, HAIS 2019, León, Spain, September 4–6, 2019, Proceedingsent://SD_ILS/0/SD_ILS:4870062024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Pérez García, Hilde. editor. (orcid)0000-0001-7112-1983 Sánchez González, Lidia. editor. (orcid)0000-0002-0760-1170 Castejón Limas, Manuel. editor. (orcid)0000-0002-5152-4555 Quintián Pardo, Héctor. editor. (orcid)0000-0002-0268-7999 Corchado Rodríguez, Emilio. editor. (orcid)0000-0001-8560-3991<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-29859-3">https://doi.org/10.1007/978-3-030-29859-3</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:3989662024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Lin, Xiaodong. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:3990392024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Nicholson, Denise. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:4017362024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Iorliam, Aamo. author. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Analyzing human behavior in cyberspaceent://SD_ILS/0/SD_ILS:4819302024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Yan, Zheng, 1958- editor. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-7128-5</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Security Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:4009432024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Bokhari, M. U. editor. Agrawal, Namrata. editor. Saini, Dharmendra. editor. SpringerLink (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile network forensics : emerging research and opportunitiesent://SD_ILS/0/SD_ILS:4817962024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Sharevski, Filipo, 1985- author. IGI Global, publisher.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5855-2</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Implementing digital forensic readiness : from reactive to proactive processent://SD_ILS/0/SD_ILS:4587712024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Sachowski, Jason, author. Ivtchenko, Dmitri, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128044544">https://www.sciencedirect.com/science/book/9780128044544</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:4587772024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128032916">http://www.sciencedirect.com/science/book/9780128032916</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>OS X incident response : scripting and analysisent://SD_ILS/0/SD_ILS:4588692024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Bradley, Jaron, author.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128044568">http://www.sciencedirect.com/science/book/9780128044568</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybervetting : Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:3564182024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Appel, Edward J., author.<br/>Preferred Shelf Number ONLINE(356418.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781482238860">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack : the v3rb0ten networkent://SD_ILS/0/SD_ILS:4586242024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Street, Jayson E., author. Sims, Kristin, author. Baskin, Brian, author. Martin, Brian, editor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="https://www.sciencedirect.com/science/book/9780128042786">https://www.sciencedirect.com/science/book/9780128042786</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:3428862024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor DeFranco, Joanna F., author.<br/>Preferred Shelf Number ONLINE(342886.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466564541">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber reconnaissance, surveillance, and defenseent://SD_ILS/0/SD_ILS:3554502024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Shimonski, Robert.<br/>Preferred Shelf Number ONLINE(355450.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128013083">http://www.sciencedirect.com/science/book/9780128013083</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cloud Storage Forensicsent://SD_ILS/0/SD_ILS:3561322024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Quick, Darren, author. Martini, Ben, 1990- author. Choo, Kim-Kwang Raymond, author.<br/>Preferred Shelf Number ONLINE(356132.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124199705">http://www.sciencedirect.com/science/book/9780124199705</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Social networking as a criminal enterpriseent://SD_ILS/0/SD_ILS:3563542024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Marcum, Catherine Davis, 1980- editor. Higgins, George E., editor.<br/>Preferred Shelf Number ONLINE(356354.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466589827">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and cyberwarfareent://SD_ILS/0/SD_ILS:3419802024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Bernik, Igor, author.<br/>Preferred Shelf Number ONLINE(341980.1)<br/>Electronic Access John Wiley <a href="http://dx.doi.org/10.1002/9781118898604">http://dx.doi.org/10.1002/9781118898604</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber threat! : how to manage the growing risk of cyber attacksent://SD_ILS/0/SD_ILS:3420202024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Ulsch, N. MacDonnell, 1951-<br/>Preferred Shelf Number ONLINE(342020.1)<br/>Electronic Access ebrary <a href="http://alltitles.ebrary.com/Doc?id=10895757">An electronic book accessible through the World Wide Web; click to view</a>
Ebook Library <a href="http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833">http://public.eblib.com/choice/publicfullrecord.aspx?p=1742833</a>
John Wiley <a href="http://dx.doi.org/10.1002/9781118915028">http://dx.doi.org/10.1002/9781118915028</a>
MyiLibrary <a href="http://www.myilibrary.com?id=629214">http://www.myilibrary.com?id=629214</a>
Cover <a href="http://swbplus.bsz-bw.de/bsz410564842cov.htm">http://swbplus.bsz-bw.de/bsz410564842cov.htm</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber crime and cyber terrorism investigator's handbookent://SD_ILS/0/SD_ILS:3556532024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Akhgar, Babak. Staniforth, Andrew. Bosco, Francesca.<br/>Preferred Shelf Number ONLINE(355653.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128007433">http://www.sciencedirect.com/science/book/9780128007433</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:3558292024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Messier, Ric, author.<br/>Preferred Shelf Number ONLINE(355829.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124170407">http://www.sciencedirect.com/science/book/9780124170407</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Targeted cyber attacks : multi-staged attacks driven by exploits and malwareent://SD_ILS/0/SD_ILS:3558532024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Sood, Aditya K., author. Enbody, Richard J., author.<br/>Preferred Shelf Number ONLINE(355853.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780128006047">http://www.sciencedirect.com/science/book/9780128006047</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:3559092024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carvey, Harlan A., author.<br/>Preferred Shelf Number ONLINE(355909.1)<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124171572">http://www.sciencedirect.com/science/book/9780124171572</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:2862482024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Doherty, Eamon P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439898789">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigating computer-related crimeent://SD_ILS/0/SD_ILS:2893922024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Stephenson, Peter. Gilbert, Keith, 1988-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420003703">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:2606742024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Leman-Langlois, Stéphane, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203105245">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber power : crime, conflict and security in cyberspaceent://SD_ILS/0/SD_ILS:3425982024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Ghernaouti-Hélie, Solange, 1958- author.<br/>Preferred Shelf Number ONLINE(342598.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466573055">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Violent Python a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:1469172024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor O'Connor, T. J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499576">http://www.sciencedirect.com/science/book/9781597499576</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics processing and procedures meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirementsent://SD_ILS/0/SD_ILS:3066942024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Watson, David (David Lilburn) Jones, Andrew.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497428">http://www.sciencedirect.com/science/book/9781597497428</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of web hacking tools and techniques to attack the Webent://SD_ILS/0/SD_ILS:3066992024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Pauli, Joshua J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780124166004">http://www.sciencedirect.com/science/book/9780124166004</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybersecurity public sector threats and responsesent://SD_ILS/0/SD_ILS:2862022024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Andreasson, Kim J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439846643">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malware forensics field guide for Windows dystems digital forensics field guidesent://SD_ILS/0/SD_ILS:1478982024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Malin, Cameron H. Casey, Eoghan. Aquilina, James M.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494724">http://www.sciencedirect.com/science/book/9781597494724</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2767002024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446587/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and the law challenges, issues, and outcomesent://SD_ILS/0/SD_ILS:2418212024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Brenner, Susan W., 1947- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781555538002/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wiki at war conflict in a socially networked worldent://SD_ILS/0/SD_ILS:2418372024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carafano, James Jay, 1955- Project Muse.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://muse.jhu.edu/books/9781603446570/">Full text available: </a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyberbullying prevention and response : expert perspectivesent://SD_ILS/0/SD_ILS:2613622024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Patchin, Justin W., 1977- Hinduja, Sameer, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://www.tandfebooks.com/isbn/9780203818312">Click here to view</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of digital forensics the primer for getting started in digital forensicsent://SD_ILS/0/SD_ILS:1452352024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Sammons, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496612">http://www.sciencedirect.com/science/book/9781597496612</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis toolkit advanced analysis techniques for Windows 7ent://SD_ILS/0/SD_ILS:1456892024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carvey, Harlan A. Kolde, Jennifer.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597497275">http://www.sciencedirect.com/science/book/9781597497275</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Network intrusion analysis methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:1462742024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Fichera, Joe, 1966- Bolt, Steven.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499620">http://www.sciencedirect.com/science/book/9781597499620</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hacking web apps detecting and preventing web application security problemsent://SD_ILS/0/SD_ILS:1481612024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Shema, Mike.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597499514">http://www.sciencedirect.com/science/book/9781597499514</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Security metrics a beginner's guideent://SD_ILS/0/SD_ILS:2932382024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Wong, Caroline.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-beginners-guide">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and espionage an analysis of subversive multi-vector threatsent://SD_ILS/0/SD_ILS:1475182024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Gragido, Will. Pirc, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496131">http://www.sciencedirect.com/science/book/9781597496131</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>FISMA principles and best practices beyond complianceent://SD_ILS/0/SD_ILS:2906542024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Howard, Patrick D.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420078305">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Internet searches for vetting, investigations, and open-source intelligenceent://SD_ILS/0/SD_ILS:2916402024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Appel, Edward J.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439827529">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing the risk of fraud and misconduct meeting the challenges of a global, regulated, and digital environmentent://SD_ILS/0/SD_ILS:2929042024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Girgenti, Richard H. Hedley, Timothy P.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/managing-risk-fraud-misconduct-meeting-challenges-global-regulated-digital-environment">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>IT security metrics a practical framework for measuring security & protecting dataent://SD_ILS/0/SD_ILS:2932942024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Hayden, Lance.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/security-metrics-practical-framework-for-measuring-protecting-data">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber Criminals on Trialent://SD_ILS/0/SD_ILS:2385502024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Smith, Russell G.. Grabosky, Peter. Urbas, Gregor.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://dx.doi.org/10.1017/CBO9780511481604">Access by subscription</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber criminology exploring Internet crimes and criminal behaviorent://SD_ILS/0/SD_ILS:2851802024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Jaishankar, K.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439829509">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:2852212024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Mena, Jesus.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781439860700">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Xbox 360 forensics a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:3065252024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Bolt, Steven. Liles, Samuel.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496230">http://www.sciencedirect.com/science/book/9781597496230</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Android forensics investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:1452532024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Hoog, Andrew. McCash, John.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496513">http://www.sciencedirect.com/science/book/9781597496513</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows Registry Forensics Advanced Digital Forensic Analysis of the Windows Registry.ent://SD_ILS/0/SD_ILS:1456592024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carvey, Harlan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495806">http://www.sciencedirect.com/science/book/9781597495806</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics with open source tools using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc.ent://SD_ILS/0/SD_ILS:1465002024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Altheide, Cory. Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495868">http://www.sciencedirect.com/science/book/9781597495868</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Gray hat hacking the ethical hacker's handbookent://SD_ILS/0/SD_ILS:2932552024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Harris, Shon. Harper, Allen. Eagle, Chris. Ness, Jonathan. Lenkey, Gideon.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://mhebooklibrary.com/reader/gray-hat-hacking-ethical-hackers-handbook-3rd-edition">Subscription required</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Principles of cybercrimeent://SD_ILS/0/SD_ILS:2779952024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Clough, Jonathan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=317646</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Seven deadliest social network attacksent://SD_ILS/0/SD_ILS:1491452024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Timm, Carl. Perez, Richard, 1969 Oct. 17- Ely, Adam.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495455">http://www.sciencedirect.com/science/book/9781597495455</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:1532952024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Casey, Eoghan. Altheide, Cory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329101">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=329101</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:3063302024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The basics of hacking and penetration testing ethical hacking and penetration testing made easyent://SD_ILS/0/SD_ILS:1451992024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Engebretson, Pat (Patrick Henry), 1974-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597496551">http://www.sciencedirect.com/science/book/9781597496551</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Dissecting the hack the forb1dd3n networkent://SD_ILS/0/SD_ILS:1465852024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Street, Jayson E. Street, Jayson E. Dissecting the hack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495684">http://www.sciencedirect.com/science/book/9781597495684</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital forensics for network, Internet, and cloud computing a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:1464822024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Lillard, Terrence.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495370">http://www.sciencedirect.com/science/book/9781597495370</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Digital triage forensics processing the digital crime sceneent://SD_ILS/0/SD_ILS:1466722024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Pearson, Stephen, 1963- Watson, Richard.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495967">http://www.sciencedirect.com/science/book/9781597495967</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Virtualization and forensics a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:1467152024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Barrett, Diane. Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597495578">http://www.sciencedirect.com/science/book/9781597495578</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:1481732024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Casey, Eoghan.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9780123742674">http://www.sciencedirect.com/science/book/9780123742674</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Profiling hackers the science of criminal profiling as applied to the world of hackingent://SD_ILS/0/SD_ILS:2914122024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Chiesa, Raoul, 1973- Ducci, Stefania. Ciappi, Silvio, 1965-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420086942">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:1464132024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Dunham, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492980">http://www.sciencedirect.com/science/book/9781597492980</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cisco router and switch forensics investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:1487032024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Liu, Dale.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597494182">http://www.sciencedirect.com/science/book/9781597494182</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber fraud tactics, techniques, and proceduresent://SD_ILS/0/SD_ILS:2914672024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Graham, James. Howard, Rick.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420091281">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malware forensics investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:1479142024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Aquilina, James M. Casey, Eoghan. Malin, Cameron H.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492683">http://www.sciencedirect.com/science/book/9781597492683</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrimeent://SD_ILS/0/SD_ILS:1489552024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Cross, Michael, 1965- Shinder, Debra Littlejohn. Scene of the cybercrime.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492768">http://www.sciencedirect.com/science/book/9781597492768</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Malicious bots an inside look into the cyber-criminal underground of the internetent://SD_ILS/0/SD_ILS:2887472024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Dunham, Ken. Melnick, Jim.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420069068">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Insider computer fraud an in-depth framework for detecting and defending against insider IT attacksent://SD_ILS/0/SD_ILS:2913492024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Brancik, Kenneth C.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420046601">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hardware-based computer security techniques to defeat hackers from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2974322024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Dube, Roger. Wiley InterScience (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://proquest.safaribooksonline.com/?fpi=9780470193396">Available by subscription from Safari Books Online</a>
John Wiley <a href="http://dx.doi.org/10.1002/9780470425497">http://dx.doi.org/10.1002/9780470425497</a>
MyiLibrary, Table of contents <a href="http://www.myilibrary.com?id=183706&ref=toc">http://www.myilibrary.com?id=183706&ref=toc</a>
Volltext <a href="http://proquest.tech.safaribooksonline.de/9780470193396">http://proquest.tech.safaribooksonline.de/9780470193396</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1483882024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">http://www.sciencedirect.com/science/book/9781597491976</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Complete guide to security and privacy metrics measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:2893602024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Herrmann, Debra S.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013283">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Wireless crime and forensic investigationent://SD_ILS/0/SD_ILS:2903282024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Kipper, Gregory.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420013016">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:1476422024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Reyes, Anthony.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491334">http://www.sciencedirect.com/science/book/9781597491334</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:1485642024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Wiles, Jack.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492232">http://www.sciencedirect.com/science/book/9781597492232</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>CD and DVD forensicsent://SD_ILS/0/SD_ILS:1488002024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Crowley, Paul. Kleiman, Dave.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491280">http://www.sciencedirect.com/science/book/9781597491280</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Alternate data storage forensicsent://SD_ILS/0/SD_ILS:1121442024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Schroader, Amber. Cohen, Tyler. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491631">http://www.sciencedirect.com/science/book/9781597491631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber crime investigations bridging the gaps between security professionals, law enforcement, and prosecutorsent://SD_ILS/0/SD_ILS:1121572024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Reyes, Anthony. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491334">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:1122062024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Kleiman, Dave. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1122112024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carvey, Harlan A. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1122142024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Winkler, Ira. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>The best damn cybercrime and digital forensics book periodent://SD_ILS/0/SD_ILS:1451972024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Cardwell, Kevin.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597492287">http://www.sciencedirect.com/science/book/9781597492287</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Alternate data storage forensicsent://SD_ILS/0/SD_ILS:1452332024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Schroader, Amber. Cohen, Tyler.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491631">http://www.sciencedirect.com/science/book/9781597491631</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Windows forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:1456782024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Carvey, Harlan A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491563">http://www.sciencedirect.com/science/book/9781597491563</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Zen and the art of information securityent://SD_ILS/0/SD_ILS:1456802024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Winkler, Ira.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491686">http://www.sciencedirect.com/science/book/9781597491686</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Forensic computer crime investigationent://SD_ILS/0/SD_ILS:2885682024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Johnson, Thomas Alfred.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420028379">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cybercrime and societyent://SD_ILS/0/SD_ILS:3680782024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Yar, Majid.<br/>Preferred Shelf Number ONLINE(368078.1)<br/>Electronic Access SAGE knowledge <a href="http://sk.sagepub.com/books/cybercrime-and-society">http://sk.sagepub.com/books/cybercrime-and-society</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1484882024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Maynor, David.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">http://www.sciencedirect.com/science/book/9781597490566</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Syngress force emerging threat analysis from mischief to maliciousent://SD_ILS/0/SD_ILS:1122022024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Maynor, David. ScienceDirect (Online service)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490566">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Cyber crime investigator's field guideent://SD_ILS/0/SD_ILS:2848232024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Middleton, Bruce.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420031324">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Black Hat physical device security exploiting hardware and softwareent://SD_ILS/0/SD_ILS:2540252024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Miller, Drew, 1978-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266818">http://www.sciencedirect.com/science/book/9781932266818</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Stealing the network how to own an identityent://SD_ILS/0/SD_ILS:2536632024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Alder, Raven. Mullen, Timothy M. Long, Johnny.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597490061">http://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:2536642024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Craig, Paul. Honick, Ron. Burnett, Mark (Mark M.)<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">http://www.sciencedirect.com/science/book/9781932266986</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Forensic computer crime investigationent://SD_ILS/0/SD_ILS:3428542024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Johnson, Thomas Alfred.<br/>Preferred Shelf Number ONLINE(342854.1)<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781466522602">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Inside the spam cartel trade secrets from the dark sideent://SD_ILS/0/SD_ILS:2540282024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Spammer-X. Sjouwerman, Stu. Posluns, Jeffrey.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266863">http://www.sciencedirect.com/science/book/9781932266863</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Managing a network vulnerability assessmentent://SD_ILS/0/SD_ILS:2891852024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Peltier, Thomas R. Peltier, Justin. Blackley, John A.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9780203503041">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Scene of the cybercrime computer forensics handbookent://SD_ILS/0/SD_ILS:2536152024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Shinder, Debra Littlejohn. Tittel, Ed.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836654">http://www.sciencedirect.com/science/book/9781931836654</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Hack proofing your identity in the information age protect your family on the internet!ent://SD_ILS/0/SD_ILS:2536172024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Bidwell, Teri. Cross, Michael, 1965- Russell, Ryan, 1969-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781931836517">http://www.sciencedirect.com/science/book/9781931836517</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigating computer-related crimeent://SD_ILS/0/SD_ILS:2886982024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Stephenson, Peter.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420048872">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Transnational criminal organizations, cybercrime, and money laundering a handbook for law enforcement officers, auditors, and financial investigatorsent://SD_ILS/0/SD_ILS:2895902024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Richards, James R., 1960-<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420048728">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>Investigating computer crimeent://SD_ILS/0/SD_ILS:2886462024-11-10T11:42:05Z2024-11-10T11:42:05ZAuthor Clark, Franklin. Diliberto, Ken.<br/>Preferred Shelf Number ONLINE<br/>Electronic Access <a href="http://marc.crcnetbase.com/isbn/9781420048896">Distributed by publisher. Purchase or institutional license may be required for access.</a><br/>Format: Electronic Resources<br/>Availability Online Library~1<br/>