Refine your search

Your search returned 50 results.

Not what you expected? Check for suggestions
Trust and crime in information societies / edited by Robin Mansell and Brian S. Collins.

by Mansell, Robin | Collins, Brian S.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Cheltenham, UK ; Northampton, MA : Edward Elgar, 2005Availability: Items available for loan: Central Library (CL)Call number: 303.48/34 TRU (1).
Information warfare : how to survive cyber attacks Michael Erbschloe.

by Erbschloe, Michael.

Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Central Library (CL)Call number: 005.8 ERB (1).
Internet denial of service: attack and defense mechanisms Jelena Mirkovic, Sven Dietrich, Dave Dittrich & Peter Reiher

by Mirkovic, Jelena | Sven Dietrich, Dave Dittrich & Peter Reiher.

Publisher: New.Jersey : Prentice Hall Professional Technical Reference, 2005Availability: Items available for loan: Central Library (CL)Call number: 005.8 MIR (1).
Cybercrime and espionage : An analysis of subversive multivector threats Will Gragido, John Pirc ; Russ Rogers.

by Gragido, Will | Pirc, John | Rogers, Russ.

Material type: Text Text Publisher: Rockland, Mass. : Oxford : Syngress ; Elsevier Science [distributor], c2011Availability: Items available for loan: Central Library (CL)Call number: 658.47 GRA (3).
Fighting computer crime : a new framework for protecting information Donn B. Parker.

by Parker, Donn B.

Material type: Text Text Publisher: New York : Wiley, c1998Availability: Items available for loan: Central Library (CL)Call number: 658.478 PAR (5).
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators. for computer hacking forensics investigators.

by Kleiman, Dave.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Burlington, MA : Syngress Pub. , c2007Other title: Exam 312-49 study guide.Online access: Publisher description Availability: Items available for loan: Central Library (CL)Call number: 005.8 (1).
The basics of digital forensics :the primer for getting started in digital forensics the primer for getting started in digital forensics John Sammons ; technical editor, Jonathan Rajewski.

by Sammons, John.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Elsevier/Syngress, c2012Availability: Items available for loan: Central Library (CL)Call number: 363.25968 SAM (1).
Technocrime, policing, and surveillance / Stephane Leman-Langlois.

by Leman-Langlois, Stéphane, 1965-.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York, NY : Routledge, 2012Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 363.259 TEC 2013 (1).
The encyclopedia of high-tech crime and crime-fighting / Michael Newton.

by Newton, Michael.

Material type: Text Text; Format: print Publisher: [S.l.] : Facts on File, 2003Online access: Amazon.com Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 364.168 NEW 2005 (1).
Cyber crime : criminal threats from cyberspace / Brenner, Susan W.

by Brenner | W., Susan.

Material type: Text Text; Format: print Publisher: [S.l.] : Pentagon Press, 2012Online access: Amazon.com Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 364.168 BRE 2012 (1).
Bandits on the information superhighway / Daniel J. Barrett.

by Barrett, Daniel J | O'Reilly & Associates.

Edition: 1st ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Bonn ; Cambridge : O'Reilly & Assoc., 1996Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 004.678 BAR (1).
Incident response and computer forensics. Chris Prosise, Kevin Mandia.

by Prosise, Chris.

Edition: 2nd ed.Material type: Text Text; Format: print ; Literary form: Not fiction Language: English Publisher: New York, New York : McGraw-Hill/Osborne, c2003Other title: Incident response & computer forensics.Online access: Publisher description | Contributor biographical information | Table of contents Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 PRO (1).
Information warfare : how to survive cyber attacks / Michael Erbschloe.

by Erbschloe, Michael, 1951-.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: New York / New Delhi : Osborne/McGraw-Hill, c2001Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 ERB (1).
Compute!'s computer security Ralph Roberts

by Roberts, Ralph.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: c.1989Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 ROB (2).
Cyberwarfare : information operations in a connected world / Mike Chapple and David Seidl.

by Chapple, Mike | Seidl, David.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: U.S.A. Jones & Bartlett Learning; C2015Online access: Click here to access online Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 CHA (1).
Information warfare : cyberterrorism--protecting your personal security in the electronic age / Winn Schwartau.

by Schwartau, Winn.

Edition: 2nd ed. Publisher: New York : Emeryville, CA : Thunder's Mouth Press ; Distributed by Publishers Group West, 1996Availability: Items available for loan: Military College of Signals (MCS)Call number: 302.2,SCH (1).
Information warfare : chaos on the electronic superhighway / Winn Schwartau.

by Schwartau, Winn.

Edition: 1st ed. Publisher: New York : Emeryville, CA : Thunder's Mouth Press ; Distributed by Publishers Group West, c1994Availability: Items available for loan: Military College of Signals (MCS)Call number: 302.2,SCH (1).
Information warfare : how to survive cyber attacks / Michael Erbschloe.

by Erbschloe, Michael.

Publisher: New York : Osborne/McGraw-Hill, c2001Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.821,ERB (1).
Computer crime : a crimefighter's handbook / David Icove, Karl Seger, and William VonStorch.

by Icove, David J | Seger, Karl A, 1940- | VonStorch, William R.

Edition: 1st ed. Publisher: Sebastopol, CA : O'Reilly & Associates, 1995Online access: Contributor biographical information | Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 364.168,ICO (1).
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit / Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor.

by Kubasiak, Ryan R | Morrissey, Sean | Varsalone, Jesse.

Publisher: Burlington, MA : Syngress Pub., c2009Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KUB (1).
Windows forensic analysis :(Include CD) DVD toolkit, / Harlan Carvey.

by Carvey, Harlan A.

Publisher: Burlington, MA : Syngress Pub., c2009Online access: Publisher description Availability: Items available for loan: Call number: 363.250968 CAR (1).
Cyber terrorism : political and economic implications / Andrew Michael Colarik.

by Colarik, Andrew M.

Publisher: Hershey, PA : Idea Group Pub., c2006Other title: Cyberterrorism.Online access: Table of contents only Availability: No items available : Checked out (1).
Computer forensics : computer crime scene investigation / John R. Vacca.

by Vacca, John R.

Edition: 2nd ed. Publisher: Hingham, Mass. : Charles River Media, 2005Online access: Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,VAC (1).
Cybercrime : the investigation, prosecution and defense of a computer-related crime / edited by Ralph D. Clifford.

by Clifford, Ralph D, 1954-.

Edition: 2nd ed. Publisher: Durham, N.C. : Carolina Academic Press, c2006Online access: Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 345.73 CYB (1).
Computer forensics : cybercriminals, laws, and evidence / by Marie-Helen Maras.

by Maras, Marie-Helen.

Publisher: Sudbury, Mass. : Jones & Bartlett Learning, 2012Availability: No items available : Checked out (1).
Computer security / John M. Carroll.

by Carroll, John M.

Edition: 3rd ed. Publisher: Boston, Mass. : Butterworth-Heinemann, 1996Online access: Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478,CAR (1).
Malware: fighting malicious code - (E-BOOK) Ed Skoudis with Lenny Zeltser

by Skoudis, Ed | Zeltser, Lenny.

Publisher: Upper Saddle River, N.J. ; London : Prentice Hall PTR, cop. 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 SKO (1).
Incident response :computer forensics toolkit -(E-BOOK) Douglas Schweitzer.

by Schweitzer, Douglas.

Publisher: Indianapolis, IN : Wiley, c2003Online access: Contributor biographical information | Publisher description | Table of contents Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.256 SCH (1).
Computer fraud casebook :the bytes that bite -(E-BOOK) edited by Joseph T. Wells.

by Wells, Joseph T.

Publisher: Hoboken, N.J. : John Wiley, c2009Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.25 COM (1).
Digital evidence and computer crime : forensic science, computers and the Internet / by Eoghan Casey ; with contributions from Susan W. Brenner ... [et al.].

by Casey, Eoghan.

Edition: 3rd ed. Publisher: Waltham, MA : Academic Press, c2011Availability: Items available for loan: Central Library (CL)Call number: 363.25 CAS (1). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 363.25,CAS (1).
Computer forensics : principles and practices / Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler.

by Volonino, Linda | Anzaldua, Reynaldo | Godwin, Jana.

Edition: 1st ed. Publisher: Upper Saddle River, N.J. : Pearson/Prentice Hall, c2007Online access: Table of contents only Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,VOL (1).
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina; Curtis W. Rose, technical editor.

by Malin, Cameron H | Aquilina, James M | Casey, Eoghan.

Publisher: Waltham, MA : Syngress, c2012. 4803161Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.84,MAL (1).
Malware : fighting malicious code / Ed Skoudis with Lenny Zeltser.

by Skoudis, Ed | Zeltser, Lenny.

Publisher: Upper Saddle River, NJ : Prentice Hall PTR, 2004Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,SKO (1).
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.

by Trost, Ryan.

Publisher: Boston, Mass. ; London : Addison-Wesley, 2010Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,TRO (1).
Inside cyber warfare (E-BOOK) Jeffrey Carr.

by Carr, Jeffrey.

Edition: 2nd ed. Publisher: Beijing ; Sebastopol, CA : O'Reilly, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.25968 JE (1).
Digital forensics for network, Internet, and cloud computing: a forensic evidence guide for moving targets and data (EBOOK) Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray.

by Lillard, Terrence V | Lillard, Terrence.

Publisher: Burlington, MA : Syngress, c2010Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.250 LIL (1).
Hacking exposed computer forensics (EBOOK) Aaron Philipp, David Cowen, Chris Davis

by Philipp, Aaron | Cowen, David | Davis, Chris.

Edition: 2nd ed. Publisher: New York : McGraw-Hill/Osborne, 2010Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8 PHI (1).
Network forensics : tracking hackers through cyberspace Sherri Davidoff, Jonathan Ham.

by Davidoff, Sherri | Ham, Jonathan.

Publisher: Upper Saddle River, NJ : Prentice Hall, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.25968 DAV (1).
Windows registry forensics : advanced digital forensic analysis of the Windows Registry / Harlan Carvey.

by Carvey, Harlan A [author.].

Edition: Second editionMaterial type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amersterdam : Syngress is an imprint of Elsevier, [2016]Availability: Items available for loan: Central Library (CL)Call number: 005.8 CAR (2).
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / Harlan Carvey.

by Carvey, Harlan A.

Edition: 4th ed.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Amsterdam ; Boston : Syngress, [2014]Availability: Items available for loan: Central Library (CL)Call number: 363.25968 CAR (2).
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters.

by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
Android forensics : investigation, analysis, and mobile security for Google Android / Andrew Hoog ; John McCash, technical editor.

by Hoog, Andrew.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Syngress, c2011Availability: Items available for loan: Central Library (CL)Call number: 005.446 HOO (2).
Netspionage, the global threat to information

by Boni, William Kovacich, Gerald L.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: OXFORD BUTTERWORTH HEINEMANN 2000Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 BON (1).
Corporate computer security / Randall J. Boyle (Longwood University), Raymond R. Panko (University of Hawaiʻi at Mānoa).

by Panko, Raymond R [author.] | Boyle, Randall [author.].

Edition: Fourth edition.Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Boston : Pearson, [2015]Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,PAN (1). Items available for reference: Military College of Signals (MCS) Not for loanCall number: 005.8,PAN (1). Checked out (1).
Malware forensics field guide for Windows systems : digital forensics field guides / Cameron H. Malin, Eoghan Casey, James M. Aquilina; Curtis W. Rose, technical editor.

by Malin, Cameron H | Casey, Eoghan | Aquilina, James M.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Waltham, MA : Syngress, c2012. 4803161Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.84,MAL (1).
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / Dawn Cappelli, Andrew Moore, Randall Trzeciak.

by Cappelli, Dawn | Moore, Andrew | Trzeciak, Randall.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Upper Saddle River, NJ : Addison-Wesley, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478,CAP (1).
Real digital forensics : computer security and incident response / Keith J. Jones, Richard Bejtlich, Curtis W. Rose.

by Jones, Keith J. (Keith John) | Bejtlich, Richard | Rose, Curtis W.

Material type: Text Text; Format: print ; Literary form: Not fiction ; Audience: Specialized; Publisher: Upper Saddle River, NJ : Addison-Wesley, 2005Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,JON (1).
Spies among us : how to stop the spies, terrorists, hackers, and criminals you don't even know you encounter every day / Ira Winkler.

by Winkler, Ira.

Material type: Text Text; Format: print ; Literary form: Not fiction Publisher: Indianapolis, IN : Wiley Pub., c2005Online access: Table of contents only | Contributor biographical information | Publisher description Availability: Items available for loan: NUST Law School (NLS)Call number: 658.472 WIN (1).
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.