|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Technocrime, policing, and surveillance / Stephane Leman-Langlois. by Leman-Langlois, Stéphane, 1965-. Edition: 1st ed.Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: New York, NY : Routledge, 2012Availability: Items available for loan: Centre for International Peace & Stability (CIPS)Call number: 363.259 TEC 2013 (1).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Compute!'s computer security Ralph Roberts by Roberts, Ralph. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: c.1989Availability: Items available for loan: Pakistan Navy Engineering College (PNEC)Call number: 005.8 ROB (2).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Mac OS X, iPod, and iPhone forensic analysis DVD toolkit / Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor. by Kubasiak, Ryan R | Morrissey, Sean | Varsalone, Jesse. Publisher: Burlington, MA : Syngress Pub., c2009Online access: Publisher description Availability: Items available for loan: Military College of Signals (MCS)Call number: 005.8,KUB (1).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Inside cyber warfare (E-BOOK) Jeffrey Carr. by Carr, Jeffrey. Edition: 2nd ed. Publisher: Beijing ; Sebastopol, CA : O'Reilly, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 363.25968 JE (1).
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory / Michael Hale Ligh, Andrew Case, Jamie Levy, Aaron Walters. by Ligh, Michael Hale | Case, Andrew (Digital forensics researcher) | Levy, Jamie | Walters, Aaron. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Indianapolis, IN : Wiley, [2014]Copyright date: ©2014Other title: Detecting malware and threats in Windows, Linux, and Mac memory.Online access: Contributor biographical information | Table of contents only Availability: Items available for loan: Central Library (CL)Call number: 004.5028558 LIG (2).
|
|
|
|
|
|
|
|
Netspionage, the global threat to information by Boni, William Kovacich, Gerald L. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: OXFORD BUTTERWORTH HEINEMANN 2000Availability: Items available for loan: College of Electrical & Mechanical Engineering (CEME)Call number: 005.8 BON (1).
|
|
|
|
|
|
|
|
|
|
|
|
The CERT guide to insider threats : how to prevent, detect, and respond to information technology crimes (theft, sabotage, fraud) / Dawn Cappelli, Andrew Moore, Randall Trzeciak. by Cappelli, Dawn | Moore, Andrew | Trzeciak, Randall. Material type: Text; Format:
print
; Literary form:
Not fiction
Publisher: Upper Saddle River, NJ : Addison-Wesley, c2012Availability: Items available for loan: Military College of Signals (MCS)Call number: 658.478,CAP (1).
|
|
|
|
|
|
|
|
|