Search Results for - Narrowed by: Computer crimes. - Computer security. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue? 2024-06-20T07:03:10Z Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflict ent://SD_ILS/0/SD_ILS:2334696 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format:&#160;Sound recording<br/> Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions ent://SD_ILS/0/SD_ILS:2329799 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime : protecting your business, your family and yourself ent://SD_ILS/0/SD_ILS:2332545 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : the complete guide to cyber threats and protection ent://SD_ILS/0/SD_ILS:2335194 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a> <a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Crisis ent://SD_ILS/0/SD_ILS:2331316 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a> <a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format:&#160;Electronic Resources<br/> The deviant security practices of cyber crime ent://SD_ILS/0/SD_ILS:2356733 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity and privacy in cyber physical systems ent://SD_ILS/0/SD_ILS:2347187 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Introductory Computer Forensics A Hands-on Practical Approach ent://SD_ILS/0/SD_ILS:2084051 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format:&#160;Electronic Resources<br/> Cyber Security Proceedings of CSI 2015 ent://SD_ILS/0/SD_ILS:2086915 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format:&#160;Electronic Resources<br/> Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeria ent://SD_ILS/0/SD_ILS:2084722 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17&minus;21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA ent://SD_ILS/0/SD_ILS:2086285 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/> Preventing digital extortion : mitigate ransomware, DDoS, and other cyber-extortion attacks ent://SD_ILS/0/SD_ILS:2229356 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Thakkar, Dhanya, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4867419">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware : defending against digital extortion ent://SD_ILS/0/SD_ILS:2311973 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Open Source Intelligence Investigation From Strategy to Implementation ent://SD_ILS/0/SD_ILS:2084294 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Akhgar, Babak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format:&#160;Electronic Resources<br/> Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World&reg;, Florida, USA ent://SD_ILS/0/SD_ILS:2087245 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the windows registry ent://SD_ILS/0/SD_ILS:2209760 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Hiding behind the keyboard : uncovering covert communication methods with forensic analysis ent://SD_ILS/0/SD_ILS:2209813 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructure ent://SD_ILS/0/SD_ILS:2313346 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Termanini, Rocky, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498726535/?ar">https://learning.oreilly.com/library/view/~/9781498726535/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar">https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498726535">https://learning.oreilly.com/library/view/~/9781498726535</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning Forensics for Law Enforcement, Security, and Intelligence ent://SD_ILS/0/SD_ILS:2313563 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a> <a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2309296 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format:&#160;Electronic Resources<br/> Who are the bad guys and what do they want? ent://SD_ILS/0/SD_ILS:2318638 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a> <a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Online Safety. ent://SD_ILS/0/SD_ILS:1280501 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Healey, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1899260">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The future of cyber security and security innovation. ent://SD_ILS/0/SD_ILS:2308889 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security breaches : studies from real life ent://SD_ILS/0/SD_ILS:2308836 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:2306747 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Technocrime, policing and surveillance ent://SD_ILS/0/SD_ILS:2128128 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Leman-Langlois, St&eacute;phane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format:&#160;Electronic Resources<br/> The dark side of personalization online privacy concerns influence customer behavior ent://SD_ILS/0/SD_ILS:2237976 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Ziesak, J&ouml;rg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation. ent://SD_ILS/0/SD_ILS:2301909 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z <a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format:&#160;Electronic Resources<br/> TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook. ent://SD_ILS/0/SD_ILS:1200156 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Wiles, Jack.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=405426">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Risk Factors in Computer-Crime Victimization. ent://SD_ILS/0/SD_ILS:1250757 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Choi, Kyung-Shick.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057793">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Handbook of research on computational forensics, digital crime, and investigation methods and solutions ent://SD_ILS/0/SD_ILS:2261483 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside cyber warfare ent://SD_ILS/0/SD_ILS:2287453 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Carr, Jeffrey.<br/><a href="https://learning.oreilly.com/library/view/~/9781449318475">https://learning.oreilly.com/library/view/~/9781449318475</a> <a href="https://learning.oreilly.com/library/view/~/9781449377229">https://learning.oreilly.com/library/view/~/9781449377229</a> <a href="https://learning.oreilly.com/library/view/~/9781449377229/?ar">https://learning.oreilly.com/library/view/~/9781449377229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar">https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet fraud casebook : the World Wide Web of deceit ent://SD_ILS/0/SD_ILS:2289384 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Wells, Joseph T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar">https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470643631/?ar">https://learning.oreilly.com/library/view/~/9780470643631/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470643631">https://learning.oreilly.com/library/view/~/9780470643631</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Social and human elements of information security emerging trends and countermeasures ent://SD_ILS/0/SD_ILS:2261911 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Gupta, Manish, 1978-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X, iPod, and iPhone forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:2287201 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber fraud tactics, techniques and procedures ent://SD_ILS/0/SD_ILS:2287651 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a> <a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer Forensics For Dummies. ent://SD_ILS/0/SD_ILS:1199862 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:2285672 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:2285587 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:64300 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Kleiman, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:2283709 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format:&#160;Electronic Resources<br/> Encyclopedia of information ethics and security ent://SD_ILS/0/SD_ILS:2261400 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8</a><br/>Format:&#160;Electronic Resources<br/> How personal &amp; Internet security works ent://SD_ILS/0/SD_ILS:2282444 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software Piracy Exposed. ent://SD_ILS/0/SD_ILS:1186052 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Honick, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254840">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:65965 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Craig, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">An electronic book accessible through the World Wide Web; click for information</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:2281993 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Alder, Raven.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490061/?ar">https://learning.oreilly.com/library/view/~/9781597490061/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490061">https://learning.oreilly.com/library/view/~/9781597490061</a> <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:2281995 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a> <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware : Fighting Malicious Code. ent://SD_ILS/0/SD_ILS:2317983 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a> <a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crackproof your software the best ways to protect your software against crackers ent://SD_ILS/0/SD_ILS:2047636 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fighting computer crime : a new framework for protecting information ent://SD_ILS/0/SD_ILS:7245 2024-06-20T07:03:10Z 2024-06-20T07:03:10Z by&#160;Parker, Donn B.<br/>Format:&#160;Books<br/>