Search Results for - Narrowed by: Computer crimes. - Computer security.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bcrimes.$002509Computer$002bcrimes.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity.$002509Computer$002bsecurity.$0026ps$003d300$0026isd$003dtrue?2024-09-25T21:40:44ZCyber security : the complete guide to cyber threats and protectionent://SD_ILS/0/SD_ILS:23351942024-09-25T21:40:44Z2024-09-25T21:40:44Zby Sutton, David (Information security practitioner), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175973">https://learning.oreilly.com/library/view/~/9781780175973</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175973/?ar">https://learning.oreilly.com/library/view/~/9781780175973/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175973/?ar</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992024-09-25T21:40:44Z2024-09-25T21:40:44Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Adversarial tradecraft in cybersecurity : offense versus defense in real-time computer conflictent://SD_ILS/0/SD_ILS:23346962024-09-25T21:40:44Z2024-09-25T21:40:44Zby Borges, Dan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar">https://go.oreilly.com/library-access/library/view/-/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818/?ar">https://learning.oreilly.com/library/view/~/9781801812818/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781801812818">https://learning.oreilly.com/library/view/~/9781801812818</a><br/>Format: Sound recording<br/>Cybercrime : protecting your business, your family and yourselfent://SD_ILS/0/SD_ILS:23325452024-09-25T21:40:44Z2024-09-25T21:40:44Zby Wade, Todd author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780175874/?ar">https://learning.oreilly.com/library/view/~/9781780175874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780175874">https://learning.oreilly.com/library/view/~/9781780175874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar">https://go.oreilly.com/library-access/library/view/-/9781780175874/?ar</a><br/>Format: Electronic Resources<br/>The deviant security practices of cyber crimeent://SD_ILS/0/SD_ILS:23567332024-09-25T21:40:44Z2024-09-25T21:40:44Zby Van de Sandt, Erik H.A., author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=6697091">Click to View</a><br/>Format: Electronic Resources<br/>Cyber Crisisent://SD_ILS/0/SD_ILS:23313162024-09-25T21:40:44Z2024-09-25T21:40:44Zby Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity and privacy in cyber physical systemsent://SD_ILS/0/SD_ILS:23471872024-09-25T21:40:44Z2024-09-25T21:40:44Zby Maleh, Yassine, 1987- editor.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=5764472">Click to View</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks (Red Team activity)ent://SD_ILS/0/SD_ILS:23159862024-09-25T21:40:44Z2024-09-25T21:40:44Zby Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062024-09-25T21:40:44Z2024-09-25T21:40:44Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>Cyber Security Proceedings of CSI 2015ent://SD_ILS/0/SD_ILS:20869152024-09-25T21:40:44Z2024-09-25T21:40:44Zby Bokhari, M. U. editor.<br/><a href="https://doi.org/10.1007/978-981-10-8536-9">https://doi.org/10.1007/978-981-10-8536-9</a><br/>Format: Electronic Resources<br/>Introductory Computer Forensics A Hands-on Practical Approachent://SD_ILS/0/SD_ILS:20840512024-09-25T21:40:44Z2024-09-25T21:40:44Zby Lin, Xiaodong. author.<br/><a href="https://doi.org/10.1007/978-3-030-00581-8">https://doi.org/10.1007/978-3-030-00581-8</a><br/>Format: Electronic Resources<br/>Fundamental Computing Forensics for Africa A Case Study of the Science in Nigeriaent://SD_ILS/0/SD_ILS:20847222024-09-25T21:40:44Z2024-09-25T21:40:44Zby Iorliam, Aamo. author.<br/><a href="https://doi.org/10.1007/978-3-319-94499-9">https://doi.org/10.1007/978-3-319-94499-9</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity, July 17−21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USAent://SD_ILS/0/SD_ILS:20862852024-09-25T21:40:44Z2024-09-25T21:40:44Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-60585-2">https://doi.org/10.1007/978-3-319-60585-2</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632024-09-25T21:40:44Z2024-09-25T21:40:44Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Ransomware : defending against digital extortionent://SD_ILS/0/SD_ILS:23119732024-09-25T21:40:44Z2024-09-25T21:40:44Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format: Electronic Resources<br/>Who are the bad guys and what do they want?ent://SD_ILS/0/SD_ILS:23186382024-09-25T21:40:44Z2024-09-25T21:40:44Zby Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format: Electronic Resources<br/>Machine Learning Forensics for Law Enforcement, Security, and Intelligenceent://SD_ILS/0/SD_ILS:23135632024-09-25T21:40:44Z2024-09-25T21:40:44Zby Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522024-09-25T21:40:44Z2024-09-25T21:40:44Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructureent://SD_ILS/0/SD_ILS:23133462024-09-25T21:40:44Z2024-09-25T21:40:44Zby Termanini, Rocky, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498726535/?ar">https://learning.oreilly.com/library/view/~/9781498726535/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar">https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498726535">https://learning.oreilly.com/library/view/~/9781498726535</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962024-09-25T21:40:44Z2024-09-25T21:40:44Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the windows registryent://SD_ILS/0/SD_ILS:22097602024-09-25T21:40:44Z2024-09-25T21:40:44Zby Carvey, Harlan, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4438754">Click to View</a><br/>Format: Electronic Resources<br/>Hiding behind the keyboard : uncovering covert communication methods with forensic analysisent://SD_ILS/0/SD_ILS:22098132024-09-25T21:40:44Z2024-09-25T21:40:44Zby Shavers, Brett, author.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=4452264">Click to View</a><br/>Format: Electronic Resources<br/>Open Source Intelligence Investigation From Strategy to Implementationent://SD_ILS/0/SD_ILS:20842942024-09-25T21:40:44Z2024-09-25T21:40:44Zby Akhgar, Babak. editor.<br/><a href="https://doi.org/10.1007/978-3-319-47671-1">https://doi.org/10.1007/978-3-319-47671-1</a><br/>Format: Electronic Resources<br/>Advances in Human Factors in Cybersecurity Proceedings of the AHFE 2016 International Conference on Human Factors in Cybersecurity, July 27-31, 2016, Walt Disney World®, Florida, USAent://SD_ILS/0/SD_ILS:20872452024-09-25T21:40:44Z2024-09-25T21:40:44Zby Nicholson, Denise. editor.<br/><a href="https://doi.org/10.1007/978-3-319-41932-9">https://doi.org/10.1007/978-3-319-41932-9</a><br/>Format: Electronic Resources<br/>The future of cyber security and security innovation.ent://SD_ILS/0/SD_ILS:23088892024-09-25T21:40:44Z2024-09-25T21:40:44Zby Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format: Electronic Resources<br/>Online Safety.ent://SD_ILS/0/SD_ILS:12805012024-09-25T21:40:44Z2024-09-25T21:40:44Zby Healey, Justin.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1899260">Click to View</a><br/>Format: Electronic Resources<br/>Managing information security breaches : studies from real lifeent://SD_ILS/0/SD_ILS:23088362024-09-25T21:40:44Z2024-09-25T21:40:44Zby Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472024-09-25T21:40:44Z2024-09-25T21:40:44Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Technocrime, policing and surveillanceent://SD_ILS/0/SD_ILS:21281282024-09-25T21:40:44Z2024-09-25T21:40:44Zby Leman-Langlois, Stéphane, 1965-<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1016143">Click to View</a><br/>Format: Electronic Resources<br/>The dark side of personalization online privacy concerns influence customer behaviorent://SD_ILS/0/SD_ILS:22379762024-09-25T21:40:44Z2024-09-25T21:40:44Zby Ziesak, Jörg.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1324048">Click to View</a><br/>Format: Electronic Resources<br/>Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.ent://SD_ILS/0/SD_ILS:23019092024-09-25T21:40:44Z2024-09-25T21:40:44Z<a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format: Electronic Resources<br/>TechnoSecurity's Guide to E-Discovery and Digital Forensics : A Comprehensive Handbook.ent://SD_ILS/0/SD_ILS:12001562024-09-25T21:40:44Z2024-09-25T21:40:44Zby Wiles, Jack.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=405426">Click to View</a><br/>Format: Electronic Resources<br/>Risk Factors in Computer-Crime Victimization.ent://SD_ILS/0/SD_ILS:12507572024-09-25T21:40:44Z2024-09-25T21:40:44Zby Choi, Kyung-Shick.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1057793">Click to View</a><br/>Format: Electronic Resources<br/>Inside cyber warfareent://SD_ILS/0/SD_ILS:22874532024-09-25T21:40:44Z2024-09-25T21:40:44Zby Carr, Jeffrey.<br/><a href="https://learning.oreilly.com/library/view/~/9781449318475">https://learning.oreilly.com/library/view/~/9781449318475</a>
<a href="https://learning.oreilly.com/library/view/~/9781449377229">https://learning.oreilly.com/library/view/~/9781449377229</a>
<a href="https://learning.oreilly.com/library/view/~/9781449377229/?ar">https://learning.oreilly.com/library/view/~/9781449377229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar">https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742024-09-25T21:40:44Z2024-09-25T21:40:44Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the f0rb1dd3n networkent://SD_ILS/0/SD_ILS:22907002024-09-25T21:40:44Z2024-09-25T21:40:44Zby Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:22893842024-09-25T21:40:44Z2024-09-25T21:40:44Zby Wells, Joseph T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar">https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470643631/?ar">https://learning.oreilly.com/library/view/~/9780470643631/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470643631">https://learning.oreilly.com/library/view/~/9780470643631</a><br/>Format: Electronic Resources<br/>Handbook of research on computational forensics, digital crime, and investigation methods and solutionsent://SD_ILS/0/SD_ILS:22614832024-09-25T21:40:44Z2024-09-25T21:40:44Zby Li, Chang-Tsun.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-836-9</a><br/>Format: Electronic Resources<br/>Mac OS X, iPod, and iPhone forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:22872012024-09-25T21:40:44Z2024-09-25T21:40:44Zby Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format: Electronic Resources<br/>Cyber fraud tactics, techniques and proceduresent://SD_ILS/0/SD_ILS:22876512024-09-25T21:40:44Z2024-09-25T21:40:44Zby Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a>
<a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format: Electronic Resources<br/>Social and human elements of information security emerging trends and countermeasuresent://SD_ILS/0/SD_ILS:22619112024-09-25T21:40:44Z2024-09-25T21:40:44Zby Gupta, Manish, 1978-<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60566-036-3</a><br/>Format: Electronic Resources<br/>Computer Forensics For Dummies.ent://SD_ILS/0/SD_ILS:11998622024-09-25T21:40:44Z2024-09-25T21:40:44Zby Volonino, Linda.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=380503">Click to View</a><br/>Format: Electronic Resources<br/>Crimeware : understanding new attacks and defensesent://SD_ILS/0/SD_ILS:22855872024-09-25T21:40:44Z2024-09-25T21:40:44Zby Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:22856722024-09-25T21:40:44Z2024-09-25T21:40:44Zby Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:643002024-09-25T21:40:44Z2024-09-25T21:40:44Zby Kleiman, Dave.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781597491976">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Encyclopedia of information ethics and securityent://SD_ILS/0/SD_ILS:22614002024-09-25T21:40:44Z2024-09-25T21:40:44Zby Quigley, Marian.<br/>Chapter PDFs via platform: <a href="http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-59140-987-8</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:22837092024-09-25T21:40:44Z2024-09-25T21:40:44Zby Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format: Electronic Resources<br/>How personal & Internet security worksent://SD_ILS/0/SD_ILS:22824442024-09-25T21:40:44Z2024-09-25T21:40:44Zby Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:659652024-09-25T21:40:44Z2024-09-25T21:40:44Zby Craig, Paul.<br/>ScienceDirect <a href="http://www.sciencedirect.com/science/book/9781932266986">An electronic book accessible through the World Wide Web; click for information</a><br/>Format: Electronic Resources<br/>Software Piracy Exposed.ent://SD_ILS/0/SD_ILS:11860522024-09-25T21:40:44Z2024-09-25T21:40:44Zby Honick, Ron.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=254840">Click to View</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:22819932024-09-25T21:40:44Z2024-09-25T21:40:44Zby Alder, Raven.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490061/?ar">https://learning.oreilly.com/library/view/~/9781597490061/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490061">https://learning.oreilly.com/library/view/~/9781597490061</a>
<a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:22819952024-09-25T21:40:44Z2024-09-25T21:40:44Zby Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a>
<a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format: Electronic Resources<br/>Malware : Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:23179832024-09-25T21:40:44Z2024-09-25T21:40:44Zby Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a>
<a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format: Electronic Resources<br/>Crackproof your software the best ways to protect your software against crackersent://SD_ILS/0/SD_ILS:20476362024-09-25T21:40:44Z2024-09-25T21:40:44Zby C̆ervĕn, Pavol.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=273482">Click to View</a><br/>Format: Electronic Resources<br/>Fighting computer crime : a new framework for protecting informationent://SD_ILS/0/SD_ILS:72452024-09-25T21:40:44Z2024-09-25T21:40:44Zby Parker, Donn B.<br/>Format: Books<br/>