Arama Sonuçları Criminalité informatique.SirsiDynix Enterprisehttps://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dCriminalit$0025C3$0025A9$002binformatique.$0026ps$003d300?dt=list2025-07-04T12:43:38ZBlackhatonomics : an inside look at the economics of cybercrimeent://SD_ILS/0/SD_ILS:22985302025-07-04T12:43:38Z2025-07-04T12:43:38Zby Gragido, Will.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497404/?ar">https://learning.oreilly.com/library/view/~/9781597497404/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar</a><br/>Format: Electronic Resources<br/>The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator.ent://SD_ILS/0/SD_ILS:22837092025-07-04T12:43:38Z2025-07-04T12:43:38Zby Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format: Electronic Resources<br/>SQL server forensic analysisent://SD_ILS/0/SD_ILS:22860692025-07-04T12:43:38Z2025-07-04T12:43:38Zby Fowler, Kevvie.<br/><a href="https://learning.oreilly.com/library/view/~/9780321533203/?ar">https://learning.oreilly.com/library/view/~/9780321533203/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321533203/?ar">https://go.oreilly.com/library-access/library/view/-/9780321533203/?ar</a><br/>Format: Electronic Resources<br/>Intelligence-driven incident response : outwitting the adversaryent://SD_ILS/0/SD_ILS:23140352025-07-04T12:43:38Z2025-07-04T12:43:38Zby Roberts, Scott J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491935187">https://learning.oreilly.com/library/view/~/9781491935187</a>
<a href="https://learning.oreilly.com/library/view/~/9781491935187/?ar">https://learning.oreilly.com/library/view/~/9781491935187/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491935187/?ar">https://go.oreilly.com/library-access/library/view/-/9781491935187/?ar</a><br/>Format: Electronic Resources<br/>Who are the bad guys and what do they want?ent://SD_ILS/0/SD_ILS:23186382025-07-04T12:43:38Z2025-07-04T12:43:38Zby Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a>
<a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format: Electronic Resources<br/>Implementing digital forensic readiness : from reactive to proactive processent://SD_ILS/0/SD_ILS:23099882025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sachowski, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045015/?ar">https://learning.oreilly.com/library/view/~/9780128045015/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045015">https://learning.oreilly.com/library/view/~/9780128045015</a><br/>Format: Electronic Resources<br/>Incident response & computer forensicsent://SD_ILS/0/SD_ILS:23048742025-07-04T12:43:38Z2025-07-04T12:43:38Zby Luttgens, Jason T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798686/?ar">https://learning.oreilly.com/library/view/~/9780071798686/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071798686">https://learning.oreilly.com/library/view/~/9780071798686</a><br/>Format: Electronic Resources<br/>The truth about avoiding scamsent://SD_ILS/0/SD_ILS:22842462025-07-04T12:43:38Z2025-07-04T12:43:38Zby Weisman, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780768681871/?ar">https://learning.oreilly.com/library/view/~/9780768681871/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780768681871/?ar">https://go.oreilly.com/library-access/library/view/-/9780768681871/?ar</a><br/>Format: Electronic Resources<br/>Digital Forensics : threatscape and best practicesent://SD_ILS/0/SD_ILS:23095022025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045428">https://learning.oreilly.com/library/view/~/9780128045428</a>
<a href="https://learning.oreilly.com/library/view/~/9780128045428/?ar">https://learning.oreilly.com/library/view/~/9780128045428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128045428/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045428/?ar</a><br/>Format: Electronic Resources<br/>Investigating internet crimes : an introduction to solving crimes in cyberspaceent://SD_ILS/0/SD_ILS:23009182025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shipley, Todd G.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078178">https://learning.oreilly.com/library/view/~/9780124078178</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078178/?ar">https://learning.oreilly.com/library/view/~/9780124078178/?ar</a><br/>Format: Electronic Resources<br/>Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation.ent://SD_ILS/0/SD_ILS:23019092025-07-04T12:43:38Z2025-07-04T12:43:38Z<a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format: Electronic Resources<br/>The basics of digital forensics : the primer for getting started in digital forensicsent://SD_ILS/0/SD_ILS:22938072025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sammons, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496612">https://learning.oreilly.com/library/view/~/9781597496612</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496612/?ar">https://learning.oreilly.com/library/view/~/9781597496612/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar</a><br/>Format: Electronic Resources<br/>The truth about computer scamsent://SD_ILS/0/SD_ILS:22910962025-07-04T12:43:38Z2025-07-04T12:43:38Zby Weisman, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132658270/?ar">https://go.oreilly.com/library-access/library/view/-/9780132658270/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132658270/?ar">https://learning.oreilly.com/library/view/~/9780132658270/?ar</a><br/>Format: Electronic Resources<br/>The best damn cybercrime and digital forensics book periodent://SD_ILS/0/SD_ILS:22856582025-07-04T12:43:38Z2025-07-04T12:43:38Zby Cardwell, Kevin.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492287/?ar">https://learning.oreilly.com/library/view/~/9781597492287/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492287/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492287/?ar</a><br/>Format: Electronic Resources<br/>Digital triage forensics : processing the digital crime sceneent://SD_ILS/0/SD_ILS:22906522025-07-04T12:43:38Z2025-07-04T12:43:38Zby Pearson, Stephen, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495967/?ar">https://learning.oreilly.com/library/view/~/9781597495967/?ar</a><br/>Format: Electronic Resources<br/>Cyber crime fighters : tales from the trenchesent://SD_ILS/0/SD_ILS:22867132025-07-04T12:43:38Z2025-07-04T12:43:38Zby Donovan, Felicia.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768687545/?ar">https://go.oreilly.com/library-access/library/view/-/9780768687545/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768687545/?ar">https://learning.oreilly.com/library/view/~/9780768687545/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780768687545">https://learning.oreilly.com/library/view/~/9780768687545</a><br/>Format: Electronic Resources<br/>Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptionsent://SD_ILS/0/SD_ILS:23297992025-07-04T12:43:38Z2025-07-04T12:43:38Zby Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format: Electronic Resources<br/>Handbook of digital forensics and investigationent://SD_ILS/0/SD_ILS:22893092025-07-04T12:43:38Z2025-07-04T12:43:38Zby Casey, Eoghan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123742674/?ar">https://go.oreilly.com/library-access/library/view/-/9780123742674/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123742674/?ar">https://learning.oreilly.com/library/view/~/9780123742674/?ar</a><br/>Format: Electronic Resources<br/>The dotCrime manifesto : how to stop Internet crimeent://SD_ILS/0/SD_ILS:22843972025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hallam-Baker, Phillip.<br/><a href="https://learning.oreilly.com/library/view/~/9780321552693/?ar">https://learning.oreilly.com/library/view/~/9780321552693/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321552693/?ar">https://go.oreilly.com/library-access/library/view/-/9780321552693/?ar</a><br/>Format: Electronic Resources<br/>The truth about avoiding credit scams : the essential truths in 20 minutesent://SD_ILS/0/SD_ILS:22852682025-07-04T12:43:38Z2025-07-04T12:43:38Zby Weisman, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137001873/?ar">https://go.oreilly.com/library-access/library/view/-/9780137001873/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780137001873/?ar">https://learning.oreilly.com/library/view/~/9780137001873/?ar</a><br/>Format: Electronic Resources<br/>Cyber fraud tactics, techniques and proceduresent://SD_ILS/0/SD_ILS:22876512025-07-04T12:43:38Z2025-07-04T12:43:38Zby Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a>
<a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format: Electronic Resources<br/>Ransomware : defending against digital extortionent://SD_ILS/0/SD_ILS:23119732025-07-04T12:43:38Z2025-07-04T12:43:38Zby Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format: Electronic Resources<br/>Malicious bots : an inside look into the cyber-criminal underground of the internetent://SD_ILS/0/SD_ILS:22870342025-07-04T12:43:38Z2025-07-04T12:43:38Zby Dunham, Ken.<br/><a href="https://learning.oreilly.com/library/view/~/9781420069068/?ar">https://learning.oreilly.com/library/view/~/9781420069068/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420069068">https://learning.oreilly.com/library/view/~/9781420069068</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420069068/?ar">https://go.oreilly.com/library-access/library/view/-/9781420069068/?ar</a><br/>Format: Electronic Resources<br/>Inside cyber warfareent://SD_ILS/0/SD_ILS:22946182025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carr, Jeffrey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449318475/?ar">https://go.oreilly.com/library-access/library/view/-/9781449318475/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781449318475/?ar">https://learning.oreilly.com/library/view/~/9781449318475/?ar</a><br/>Format: Electronic Resources<br/>Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufklärenent://SD_ILS/0/SD_ILS:23027572025-07-04T12:43:38Z2025-07-04T12:43:38Zby Goschenneck, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9781492014294/?ar">https://learning.oreilly.com/library/view/~/9781492014294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492014294/?ar">https://go.oreilly.com/library-access/library/view/-/9781492014294/?ar</a><br/>Format: Electronic Resources<br/>Crimeware : understanding new attacks and defensesent://SD_ILS/0/SD_ILS:22855872025-07-04T12:43:38Z2025-07-04T12:43:38Zby Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics basics : a practical guide using Windows OSent://SD_ILS/0/SD_ILS:23198132025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format: Electronic Resources<br/>Mastering Windows network forensics and investigationent://SD_ILS/0/SD_ILS:22991762025-07-04T12:43:38Z2025-07-04T12:43:38Zby Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format: Electronic Resources<br/>Fighting financial crimes with artificial intelligenceent://SD_ILS/0/SD_ILS:23209092025-07-04T12:43:38Z2025-07-04T12:43:38Zby Kureishy, Atif, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052678">https://learning.oreilly.com/library/view/~/9781492052678</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052678/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052678/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052678/?ar">https://learning.oreilly.com/library/view/~/9781492052678/?ar</a><br/>Format: Electronic Resources<br/>The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructureent://SD_ILS/0/SD_ILS:23133462025-07-04T12:43:38Z2025-07-04T12:43:38Zby Termanini, Rocky, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498726535/?ar">https://learning.oreilly.com/library/view/~/9781498726535/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar">https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498726535">https://learning.oreilly.com/library/view/~/9781498726535</a><br/>Format: Electronic Resources<br/>Mobile forensic investigations : a guide to evidence collection, analysis, and presentationent://SD_ILS/0/SD_ILS:23186852025-07-04T12:43:38Z2025-07-04T12:43:38Zby Reiber, Lee, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260135107/?ar">https://go.oreilly.com/library-access/library/view/-/9781260135107/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781260135107/?ar">https://learning.oreilly.com/library/view/~/9781260135107/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics and digital investigation with EnCase Forensic v7ent://SD_ILS/0/SD_ILS:23048302025-07-04T12:43:38Z2025-07-04T12:43:38Zby Widup, Suzanne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar">https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071807913/?ar">https://learning.oreilly.com/library/view/~/9780071807913/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071807913">https://learning.oreilly.com/library/view/~/9780071807913</a><br/>Format: Electronic Resources<br/>Cyber Forensics, 2nd Editionent://SD_ILS/0/SD_ILS:23248862025-07-04T12:43:38Z2025-07-04T12:43:38Zby Marcella, Albert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439848234">https://learning.oreilly.com/library/view/~/9781439848234</a>
<a href="https://learning.oreilly.com/library/view/~/9781439848234/?ar">https://learning.oreilly.com/library/view/~/9781439848234/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439848234/?ar">https://go.oreilly.com/library-access/library/view/-/9781439848234/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime investigative case management : using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22985262025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shavers, Brett.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095069">https://learning.oreilly.com/library/view/~/9780124095069</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095069/?ar">https://learning.oreilly.com/library/view/~/9780124095069/?ar</a><br/>Format: Electronic Resources<br/>Cyber crime investigator's field guideent://SD_ILS/0/SD_ILS:22818352025-07-04T12:43:38Z2025-07-04T12:43:38Zby Middleton, Bruce.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031324/?ar">https://learning.oreilly.com/library/view/~/9781420031324/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420031324/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031324/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781420031324">https://learning.oreilly.com/library/view/~/9781420031324</a><br/>Format: Electronic Resources<br/>Cybercrime case presentation : using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22985172025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9780124095045/?ar">https://learning.oreilly.com/library/view/~/9780124095045/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095045">https://learning.oreilly.com/library/view/~/9780124095045</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar</a><br/>Format: Electronic Resources<br/>Patrolling the dark net : what you don't know will hurt youent://SD_ILS/0/SD_ILS:23166562025-07-04T12:43:38Z2025-07-04T12:43:38Zby Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042709/?ar">https://learning.oreilly.com/library/view/~/9781492042709/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492042709/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042709/?ar</a><br/>Format: Electronic Resources<br/>Digital evidence and computer crime : forensic science, computers and the internetent://SD_ILS/0/SD_ILS:22915162025-07-04T12:43:38Z2025-07-04T12:43:38Zby Casey, Eoghan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123742681/?ar">https://go.oreilly.com/library-access/library/view/-/9780123742681/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780123742681/?ar">https://learning.oreilly.com/library/view/~/9780123742681/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics : infoSec Pro guideent://SD_ILS/0/SD_ILS:22991542025-07-04T12:43:38Z2025-07-04T12:43:38Zby Cowen, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780071742450">https://learning.oreilly.com/library/view/~/9780071742450</a>
<a href="https://learning.oreilly.com/library/view/~/9780071742450/?ar">https://learning.oreilly.com/library/view/~/9780071742450/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar</a><br/>Format: Electronic Resources<br/>Computer-Forensik Hacksent://SD_ILS/0/SD_ILS:22962292025-07-04T12:43:38Z2025-07-04T12:43:38Zby Kuhlee, Lorenz.<br/><a href="https://learning.oreilly.com/library/view/~/9783868997637">https://learning.oreilly.com/library/view/~/9783868997637</a>
<a href="https://learning.oreilly.com/library/view/~/9783868997637/?ar">https://learning.oreilly.com/library/view/~/9783868997637/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar">https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity attacks (Red Team activity)ent://SD_ILS/0/SD_ILS:23159862025-07-04T12:43:38Z2025-07-04T12:43:38Zby Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format: Electronic Resources<br/>Digital archaeology LiveLessons (sneak peek video training) : the art and science of digital forensicsent://SD_ILS/0/SD_ILS:23042612025-07-04T12:43:38Z2025-07-04T12:43:38Zby Graves, Michael W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132853835/?ar">https://go.oreilly.com/library-access/library/view/-/9780132853835/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780132853835/?ar">https://learning.oreilly.com/videos/~/9780132853835/?ar</a><br/>Format: Electronic Resources<br/>Virtualization and forensics : a digital forensic investigator's guide to virtual environmentsent://SD_ILS/0/SD_ILS:22900412025-07-04T12:43:38Z2025-07-04T12:43:38Zby Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format: Electronic Resources<br/>Cyber Crisisent://SD_ILS/0/SD_ILS:23313162025-07-04T12:43:38Z2025-07-04T12:43:38Zby Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a>
<a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format: Electronic Resources<br/>Practical Linux forensics : a guide for digital investigatorsent://SD_ILS/0/SD_ILS:23293382025-07-04T12:43:38Z2025-07-04T12:43:38Zby Nikkel, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129781">https://learning.oreilly.com/library/view/~/9781098129781</a>
<a href="https://learning.oreilly.com/library/view/~/9781098129781/?ar">https://learning.oreilly.com/library/view/~/9781098129781/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781098129781/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129781/?ar</a><br/>Format: Electronic Resources<br/>Integrating Python with Leading Computer Forensics Platforms.ent://SD_ILS/0/SD_ILS:23116132025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128099506">https://learning.oreilly.com/library/view/~/9780128099506</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar">https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128099506/?ar">https://learning.oreilly.com/library/view/~/9780128099506/?ar</a><br/>Format: Electronic Resources<br/>Cyberwar and information warfareent://SD_ILS/0/SD_ILS:22975562025-07-04T12:43:38Z2025-07-04T12:43:38Zby Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118603512">https://learning.oreilly.com/library/view/~/9781118603512</a>
<a href="https://learning.oreilly.com/library/view/~/9781118603512/?ar">https://learning.oreilly.com/library/view/~/9781118603512/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118603512/?ar">https://go.oreilly.com/library-access/library/view/-/9781118603512/?ar</a><br/>Format: Electronic Resources<br/>Digital archaeology : the art and science of digital forensicsent://SD_ILS/0/SD_ILS:23001732025-07-04T12:43:38Z2025-07-04T12:43:38Zby Graves, Michael W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132853774/?ar">https://go.oreilly.com/library-access/library/view/-/9780132853774/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132853774">https://learning.oreilly.com/library/view/~/9780132853774</a>
<a href="https://learning.oreilly.com/library/view/~/9780132853774/?ar">https://learning.oreilly.com/library/view/~/9780132853774/?ar</a><br/>Format: Electronic Resources<br/>Network intrusion analysis : methodologies, tools, and techniques for incident analysis and responseent://SD_ILS/0/SD_ILS:22963922025-07-04T12:43:38Z2025-07-04T12:43:38Zby Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format: Electronic Resources<br/>Practical cyber forensics : an incident-based approach to forensic investigationsent://SD_ILS/0/SD_ILS:23215212025-07-04T12:43:38Z2025-07-04T12:43:38Zby Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format: Electronic Resources<br/>A practical guide to computer forensics investigationsent://SD_ILS/0/SD_ILS:23056322025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format: Electronic Resources<br/>The basics of digital forensics : the primer for getting started in digital forensicsent://SD_ILS/0/SD_ILS:23045472025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sammons, John, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128016350/?ar">https://go.oreilly.com/library-access/library/view/-/9780128016350/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128016350/?ar">https://learning.oreilly.com/library/view/~/9780128016350/?ar</a><br/>Format: Electronic Resources<br/>Hands-on incident response and digital forensicsent://SD_ILS/0/SD_ILS:23171142025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780174204/?ar">https://learning.oreilly.com/library/view/~/9781780174204/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780174204">https://learning.oreilly.com/library/view/~/9781780174204</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar</a><br/>Format: Electronic Resources<br/>Cyber-physical attack recovery procedures : a step-by-step preparation and response guideent://SD_ILS/0/SD_ILS:23110182025-07-04T12:43:38Z2025-07-04T12:43:38Zby Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484220658/?ar">https://learning.oreilly.com/library/view/~/9781484220658/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirementsent://SD_ILS/0/SD_ILS:23011602025-07-04T12:43:38Z2025-07-04T12:43:38Zby Watson, David (David Lilburn)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497428/?ar">https://learning.oreilly.com/library/view/~/9781597497428/?ar</a><br/>Format: Electronic Resources<br/>Mobile forensic investigations : a guide to evidence collection, analysis, and presentationent://SD_ILS/0/SD_ILS:23096422025-07-04T12:43:38Z2025-07-04T12:43:38Zby Reiber, Lee, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071843645/?ar">https://go.oreilly.com/library-access/library/view/-/9780071843645/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071843645/?ar">https://learning.oreilly.com/library/view/~/9780071843645/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071843645">https://learning.oreilly.com/library/view/~/9780071843645</a><br/>Format: Electronic Resources<br/>Internet forensicsent://SD_ILS/0/SD_ILS:22820552025-07-04T12:43:38Z2025-07-04T12:43:38Zby Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a>
<a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format: Electronic Resources<br/>Threat intelligence in practice : a practical guide to threat intelligence from successful organizationsent://SD_ILS/0/SD_ILS:23184352025-07-04T12:43:38Z2025-07-04T12:43:38Zby Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format: Electronic Resources<br/>CCFP certified cyber forensics professional certification : exam guideent://SD_ILS/0/SD_ILS:23048362025-07-04T12:43:38Z2025-07-04T12:43:38Zby Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071839761/?ar">https://go.oreilly.com/library-access/library/view/-/9780071839761/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780071839761/?ar">https://learning.oreilly.com/library/view/~/9780071839761/?ar</a><br/>Format: Electronic Resources<br/>Post-incident reviews : learning from failure for improved incident responseent://SD_ILS/0/SD_ILS:23184992025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a>
<a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format: Electronic Resources<br/>Computer incident response and forensics team management : conducting a successful incident responseent://SD_ILS/0/SD_ILS:23006702025-07-04T12:43:38Z2025-07-04T12:43:38Zby Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format: Electronic Resources<br/>Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and businessent://SD_ILS/0/SD_ILS:22963282025-07-04T12:43:38Z2025-07-04T12:43:38Zby Laykin, Erik.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar">https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118235225/?ar">https://learning.oreilly.com/library/view/~/9781118235225/?ar</a><br/>Format: Electronic Resources<br/>CD and DVD forensicsent://SD_ILS/0/SD_ILS:22835632025-07-04T12:43:38Z2025-07-04T12:43:38Zby Crowley, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491280/?ar">https://learning.oreilly.com/library/view/~/9781597491280/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597491280/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491280/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597491280">https://learning.oreilly.com/library/view/~/9781597491280</a>
<a href="https://www.sciencedirect.com/science/book/9781597491280">https://www.sciencedirect.com/science/book/9781597491280</a><br/>Format: Electronic Resources<br/>Cybercrime : wie Sie Gefahren im Internet erkennen und sich schützenent://SD_ILS/0/SD_ILS:23230122025-07-04T12:43:38Z2025-07-04T12:43:38Zby Schuh, Jürgen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123697/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123697/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123697/?ar">https://learning.oreilly.com/library/view/~/9781098123697/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781098123697">https://learning.oreilly.com/library/view/~/9781098123697</a><br/>Format: Electronic Resources<br/>Digital forensics and cyber crime with Kali Linux fundamentalsent://SD_ILS/0/SD_ILS:23140432025-07-04T12:43:38Z2025-07-04T12:43:38Zby Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format: Electronic Resources<br/>The second economy : the race for trust, treasure and time in the cybersecurity warent://SD_ILS/0/SD_ILS:23125522025-07-04T12:43:38Z2025-07-04T12:43:38Zby Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics explainedent://SD_ILS/0/SD_ILS:23180232025-07-04T12:43:38Z2025-07-04T12:43:38Zby Gogolin, Greg, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439874950/?ar">https://learning.oreilly.com/library/view/~/9781439874950/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar">https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439874950">https://learning.oreilly.com/library/view/~/9781439874950</a><br/>Format: Electronic Resources<br/>Malware : Fighting Malicious Code.ent://SD_ILS/0/SD_ILS:23179832025-07-04T12:43:38Z2025-07-04T12:43:38Zby Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a>
<a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity incident response : how to contain, eradicate, and recover from incidentsent://SD_ILS/0/SD_ILS:23176702025-07-04T12:43:38Z2025-07-04T12:43:38Zby Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format: Electronic Resources<br/>Cyber security : a practitioner's guideent://SD_ILS/0/SD_ILS:23137632025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format: Electronic Resources<br/>Software piracy exposedent://SD_ILS/0/SD_ILS:22819952025-07-04T12:43:38Z2025-07-04T12:43:38Zby Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a>
<a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format: Electronic Resources<br/>Cybersecurity Ops with bash : attack, defend, and analyze from the command lineent://SD_ILS/0/SD_ILS:23192522025-07-04T12:43:38Z2025-07-04T12:43:38Zby Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a>
<a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format: Electronic Resources<br/>Techno security's guide to e-discovery and digital forensicsent://SD_ILS/0/SD_ILS:22845142025-07-04T12:43:38Z2025-07-04T12:43:38Zby Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format: Electronic Resources<br/>Big data analytics with applications in insider threat detectionent://SD_ILS/0/SD_ILS:23154632025-07-04T12:43:38Z2025-07-04T12:43:38Zby Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar">https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781351645768/?ar">https://learning.oreilly.com/library/view/~/9781351645768/?ar</a><br/>Format: Electronic Resources<br/>Cloud storage forensicsent://SD_ILS/0/SD_ILS:23025072025-07-04T12:43:38Z2025-07-04T12:43:38Zby Quick, Darren.<br/><a href="https://learning.oreilly.com/library/view/~/9780124199705/?ar">https://learning.oreilly.com/library/view/~/9780124199705/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124199705/?ar">https://go.oreilly.com/library-access/library/view/-/9780124199705/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics for dummiesent://SD_ILS/0/SD_ILS:22856722025-07-04T12:43:38Z2025-07-04T12:43:38Zby Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format: Electronic Resources<br/>Python digital forensics cookbook : effective Python recipes for digital investigationsent://SD_ILS/0/SD_ILS:23144532025-07-04T12:43:38Z2025-07-04T12:43:38Zby Miller, Preston, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783987467/?ar">https://go.oreilly.com/library-access/library/view/-/9781783987467/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783987467">https://learning.oreilly.com/library/view/~/9781783987467</a>
<a href="https://learning.oreilly.com/library/view/~/9781783987467/?ar">https://learning.oreilly.com/library/view/~/9781783987467/?ar</a><br/>Format: Electronic Resources<br/>Windows forensics cookbook : 61 recipes to help you analyze Windows systemsent://SD_ILS/0/SD_ILS:23139902025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format: Electronic Resources<br/>Executing Windows command line investigations : while ensuring evidentiary integrityent://SD_ILS/0/SD_ILS:23108062025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128092712">https://learning.oreilly.com/library/view/~/9780128092712</a>
<a href="https://learning.oreilly.com/library/view/~/9780128092712/?ar">https://learning.oreilly.com/library/view/~/9780128092712/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar">https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Windows systems : digital forensics field guidesent://SD_ILS/0/SD_ILS:22946822025-07-04T12:43:38Z2025-07-04T12:43:38Zby Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format: Electronic Resources<br/>Xbox 360 forensics : a digital forensics guide to examining artifactsent://SD_ILS/0/SD_ILS:22909782025-07-04T12:43:38Z2025-07-04T12:43:38Zby Bolt, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496230">https://learning.oreilly.com/library/view/~/9781597496230</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496230/?ar">https://learning.oreilly.com/library/view/~/9781597496230/?ar</a><br/>Format: Electronic Resources<br/>Fraud detection without feature engineeringent://SD_ILS/0/SD_ILS:23224342025-07-04T12:43:38Z2025-07-04T12:43:38Zby Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a>
<a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format: Electronic Resources<br/>Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tacticsent://SD_ILS/0/SD_ILS:23157062025-07-04T12:43:38Z2025-07-04T12:43:38Zby Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format: Electronic Resources<br/>A comprehensive look at fraud identification and preventionent://SD_ILS/0/SD_ILS:23075612025-07-04T12:43:38Z2025-07-04T12:43:38Zby Youngblood, James, 1960-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498700320/?ar">https://go.oreilly.com/library-access/library/view/-/9781498700320/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781498700320">https://learning.oreilly.com/library/view/~/9781498700320</a>
<a href="https://learning.oreilly.com/library/view/~/9781498700320/?ar">https://learning.oreilly.com/library/view/~/9781498700320/?ar</a><br/>Format: Electronic Resources<br/>Incident response primer : how to keep from getting pwned too hardent://SD_ILS/0/SD_ILS:23233162025-07-04T12:43:38Z2025-07-04T12:43:38Zby Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format: Electronic Resources<br/>Learning computer forensicsent://SD_ILS/0/SD_ILS:22985542025-07-04T12:43:38Z2025-07-04T12:43:38Zby Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format: Electronic Resources<br/>Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsuent://SD_ILS/0/SD_ILS:23326572025-07-04T12:43:38Z2025-07-04T12:43:38Zby Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format: Electronic Resources<br/>Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc.ent://SD_ILS/0/SD_ILS:22912212025-07-04T12:43:38Z2025-07-04T12:43:38Zby Altheide, Cory.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495868/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495868/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495868/?ar">https://learning.oreilly.com/library/view/~/9781597495868/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495868">https://learning.oreilly.com/library/view/~/9781597495868</a><br/>Format: Electronic Resources<br/>Unix and Linux forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:22864452025-07-04T12:43:38Z2025-07-04T12:43:38Zby Pogue, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492690/?ar">https://learning.oreilly.com/library/view/~/9781597492690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492690/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492690/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492690">https://learning.oreilly.com/library/view/~/9781597492690</a><br/>Format: Electronic Resources<br/>Contemporary digital forensic investigations of cloud and mobile applicationsent://SD_ILS/0/SD_ILS:23120082025-07-04T12:43:38Z2025-07-04T12:43:38Zby Choo, Kim-Kwang Raymond, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar">https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128054482/?ar">https://learning.oreilly.com/library/view/~/9780128054482/?ar</a><br/>Format: Electronic Resources<br/>What every engineer should know about cyber security and digital forensicsent://SD_ILS/0/SD_ILS:23014742025-07-04T12:43:38Z2025-07-04T12:43:38Zby DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format: Electronic Resources<br/>Computer forensics jumpstartent://SD_ILS/0/SD_ILS:22914362025-07-04T12:43:38Z2025-07-04T12:43:38Zby Solomon, Michael (Michael G.), 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9781118067659/?ar">https://learning.oreilly.com/library/view/~/9781118067659/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118067659/?ar">https://go.oreilly.com/library-access/library/view/-/9781118067659/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics and incident response : an intelligent way to respond to attacksent://SD_ILS/0/SD_ILS:23139152025-07-04T12:43:38Z2025-07-04T12:43:38Zby Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787288683">https://learning.oreilly.com/library/view/~/9781787288683</a>
<a href="https://learning.oreilly.com/library/view/~/9781787288683/?ar">https://learning.oreilly.com/library/view/~/9781787288683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:22891492025-07-04T12:43:38Z2025-07-04T12:43:38Zby Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format: Electronic Resources<br/>Malware forensics : investigating and analyzing malicious codeent://SD_ILS/0/SD_ILS:22856932025-07-04T12:43:38Z2025-07-04T12:43:38Zby Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the V3rb0ten networkent://SD_ILS/0/SD_ILS:23092962025-07-04T12:43:38Z2025-07-04T12:43:38Zby Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format: Electronic Resources<br/>EnCase computer forensics : the official EnCE : EnCase certified examiner study guideent://SD_ILS/0/SD_ILS:22962952025-07-04T12:43:38Z2025-07-04T12:43:38Zby Bunting, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118058985/?ar">https://learning.oreilly.com/library/view/~/9781118058985/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118058985/?ar">https://go.oreilly.com/library-access/library/view/-/9781118058985/?ar</a><br/>Format: Electronic Resources<br/>Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniquesent://SD_ILS/0/SD_ILS:23229442025-07-04T12:43:38Z2025-07-04T12:43:38Zby Troia, Vinny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119540922/?ar">https://go.oreilly.com/library-access/library/view/-/9781119540922/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119540922">https://learning.oreilly.com/library/view/~/9781119540922</a>
<a href="https://learning.oreilly.com/library/view/~/9781119540922/?ar">https://learning.oreilly.com/library/view/~/9781119540922/?ar</a><br/>Format: Electronic Resources<br/>Cyber forensics : from data to digital evidenceent://SD_ILS/0/SD_ILS:22931622025-07-04T12:43:38Z2025-07-04T12:43:38Zby Marcella, Albert J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118273661/?ar">https://go.oreilly.com/library-access/library/view/-/9781118273661/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118273661/?ar">https://learning.oreilly.com/library/view/~/9781118273661/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118273661">https://learning.oreilly.com/library/view/~/9781118273661</a><br/>Format: Electronic Resources<br/>Cisco router and switch forensics : investigating and analyzing malicious network activityent://SD_ILS/0/SD_ILS:22871802025-07-04T12:43:38Z2025-07-04T12:43:38Zby Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format: Electronic Resources<br/>Wireless crime and forensic investigationent://SD_ILS/0/SD_ILS:22830082025-07-04T12:43:38Z2025-07-04T12:43:38Zby Kipper, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013016">https://learning.oreilly.com/library/view/~/9781420013016</a>
<a href="https://learning.oreilly.com/library/view/~/9781420013016/?ar">https://learning.oreilly.com/library/view/~/9781420013016/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781420013016/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013016/?ar</a><br/>Format: Electronic Resources<br/>Practical Windows forensics : leverage the power of digital forensics for Windows systemsent://SD_ILS/0/SD_ILS:23110212025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format: Electronic Resources<br/>Mac OS X, iPod, and iPhone forensic analysis DVD toolkitent://SD_ILS/0/SD_ILS:22872012025-07-04T12:43:38Z2025-07-04T12:43:38Zby Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format: Electronic Resources<br/>This machine kills secretsent://SD_ILS/0/SD_ILS:23042922025-07-04T12:43:38Z2025-07-04T12:43:38Zby Greenberg, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781452629902">https://learning.oreilly.com/library/view/~/9781452629902</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781452629902/?ar">https://go.oreilly.com/library-access/library/view/-/9781452629902/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781452629902/?ar">https://learning.oreilly.com/library/view/~/9781452629902/?ar</a><br/>Format: Sound recording<br/>Cybercrime and espionage : an analysis of subversive multi-vector threatsent://SD_ILS/0/SD_ILS:22908382025-07-04T12:43:38Z2025-07-04T12:43:38Zby Gragido, Will.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496148">https://learning.oreilly.com/library/view/~/9781597496148</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496148/?ar">https://learning.oreilly.com/library/view/~/9781597496148/?ar</a><br/>Format: Electronic Resources<br/>Inside cyber warfareent://SD_ILS/0/SD_ILS:22874532025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carr, Jeffrey.<br/><a href="https://learning.oreilly.com/library/view/~/9781449318475">https://learning.oreilly.com/library/view/~/9781449318475</a>
<a href="https://learning.oreilly.com/library/view/~/9781449377229">https://learning.oreilly.com/library/view/~/9781449377229</a>
<a href="https://learning.oreilly.com/library/view/~/9781449377229/?ar">https://learning.oreilly.com/library/view/~/9781449377229/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar">https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar</a><br/>Format: Electronic Resources<br/>Incident response & computer forensicsent://SD_ILS/0/SD_ILS:22809582025-07-04T12:43:38Z2025-07-04T12:43:38Zby Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a>
<a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format: Electronic Resources<br/>Mining the social web, mailboxes : learn to analyze and query large volumes of email using Python and Pandasent://SD_ILS/0/SD_ILS:23142792025-07-04T12:43:38Z2025-07-04T12:43:38Zby Klassen, Mikhail, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491989906/?ar">https://go.oreilly.com/library-access/library/view/-/9781491989906/?ar</a>
<a href="https://learning.oreilly.com/videos/~/9781491989906/?ar">https://learning.oreilly.com/videos/~/9781491989906/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:23025922025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format: Electronic Resources<br/>Managing information security breaches : studies from real lifeent://SD_ILS/0/SD_ILS:23088362025-07-04T12:43:38Z2025-07-04T12:43:38Zby Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format: Electronic Resources<br/>Data breaches : crisis and opportunityent://SD_ILS/0/SD_ILS:23222222025-07-04T12:43:38Z2025-07-04T12:43:38Zby Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format: Electronic Resources<br/>Introduction to cyber-warfare : a multidisciplinary approachent://SD_ILS/0/SD_ILS:23001962025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a>
<a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format: Electronic Resources<br/>Hands-on network forensics : investigate network attacks and find evidence using common network forensic toolsent://SD_ILS/0/SD_ILS:23198362025-07-04T12:43:38Z2025-07-04T12:43:38Zby Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format: Electronic Resources<br/>Protecting your web applications : solutions and strategies to combat cybersecurity threatsent://SD_ILS/0/SD_ILS:23211662025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a>
<a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format: Electronic Resources<br/>The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memoryent://SD_ILS/0/SD_ILS:23067472025-07-04T12:43:38Z2025-07-04T12:43:38Zby Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format: Electronic Resources<br/>Computer incident response and product securityent://SD_ILS/0/SD_ILS:22917152025-07-04T12:43:38Z2025-07-04T12:43:38Zby Rajnovic, Damir, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format: Electronic Resources<br/>Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidenceent://SD_ILS/0/SD_ILS:23164052025-07-04T12:43:38Z2025-07-04T12:43:38Zby Furneaux, Nick, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119480587/?ar">https://learning.oreilly.com/library/view/~/9781119480587/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119480587/?ar">https://go.oreilly.com/library-access/library/view/-/9781119480587/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781119480587">https://learning.oreilly.com/library/view/~/9781119480587</a><br/>Format: Electronic Resources<br/>The cyber risk handbook : creating and measuring effective cybersecurity capabilitiesent://SD_ILS/0/SD_ILS:23129892025-07-04T12:43:38Z2025-07-04T12:43:38Zby Antonucci, Domenic, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119308805">https://learning.oreilly.com/library/view/~/9781119308805</a>
<a href="https://learning.oreilly.com/library/view/~/9781119308805/?ar">https://learning.oreilly.com/library/view/~/9781119308805/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar">https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar</a><br/>Format: Electronic Resources<br/>Practical forensic imaging : securing digital evidence with Linux toolsent://SD_ILS/0/SD_ILS:23110392025-07-04T12:43:38Z2025-07-04T12:43:38Zby Nikkel, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492018049/?ar">https://learning.oreilly.com/library/view/~/9781492018049/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492018049/?ar">https://go.oreilly.com/library-access/library/view/-/9781492018049/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781492018049">https://learning.oreilly.com/library/view/~/9781492018049</a><br/>Format: Electronic Resources<br/>Computer forensics : a pocket guideent://SD_ILS/0/SD_ILS:22896162025-07-04T12:43:38Z2025-07-04T12:43:38Zby Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format: Electronic Resources<br/>How personal & Internet security worksent://SD_ILS/0/SD_ILS:22824442025-07-04T12:43:38Z2025-07-04T12:43:38Zby Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format: Electronic Resources<br/>Implementing digital forensic readiness : from reactive to proactive processent://SD_ILS/0/SD_ILS:23184862025-07-04T12:43:38Z2025-07-04T12:43:38Zby Sachowski, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429805820">https://learning.oreilly.com/library/view/~/9780429805820</a>
<a href="https://learning.oreilly.com/library/view/~/9780429805820/?ar">https://learning.oreilly.com/library/view/~/9780429805820/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780429805820/?ar">https://go.oreilly.com/library-access/library/view/-/9780429805820/?ar</a><br/>Format: Electronic Resources<br/>The Internet and society a reference handbookent://SD_ILS/0/SD_ILS:2800872025-07-04T12:43:38Z2025-07-04T12:43:38Zby Schell, Bernadette H. (Bernadette Hlubik), 1952-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186374">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186374</a><br/>Format: Electronic Resources<br/>Managing Information Security Breaches : Studies from Real Life.ent://SD_ILS/0/SD_ILS:22906742025-07-04T12:43:38Z2025-07-04T12:43:38Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format: Electronic Resources<br/>Computer forensics : evidence collection and managementent://SD_ILS/0/SD_ILS:22901482025-07-04T12:43:38Z2025-07-04T12:43:38Zby Newman, Robert C.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780849305627/?ar">https://go.oreilly.com/library-access/library/view/-/9780849305627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780849305627/?ar">https://learning.oreilly.com/library/view/~/9780849305627/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780849305627">https://learning.oreilly.com/library/view/~/9780849305627</a><br/>Format: Electronic Resources<br/>Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacksent://SD_ILS/0/SD_ILS:23101212025-07-04T12:43:38Z2025-07-04T12:43:38Zby Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format: Electronic Resources<br/>Cyberpsychology : the study of individuals, society and digital technologiesent://SD_ILS/0/SD_ILS:23123302025-07-04T12:43:38Z2025-07-04T12:43:38Zby Whitty, Monica T., 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470975626/?ar">https://go.oreilly.com/library-access/library/view/-/9780470975626/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470975626/?ar">https://learning.oreilly.com/library/view/~/9780470975626/?ar</a><br/>Format: Electronic Resources<br/>Machine Learning Forensics for Law Enforcement, Security, and Intelligenceent://SD_ILS/0/SD_ILS:23135632025-07-04T12:43:38Z2025-07-04T12:43:38Zby Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a>
<a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format: Electronic Resources<br/>Cyber reconnaissance surveillance and defenseent://SD_ILS/0/SD_ILS:23049792025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128013083">https://learning.oreilly.com/library/view/~/9780128013083</a>
<a href="https://learning.oreilly.com/library/view/~/9780128013083/?ar">https://learning.oreilly.com/library/view/~/9780128013083/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar</a><br/>Format: Electronic Resources<br/>Dissecting the hack : the f0rb1dd3n networkent://SD_ILS/0/SD_ILS:22907002025-07-04T12:43:38Z2025-07-04T12:43:38Zby Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics for handheld devicesent://SD_ILS/0/SD_ILS:22954762025-07-04T12:43:38Z2025-07-04T12:43:38Zby Doherty, Eamon P.<br/><a href="https://learning.oreilly.com/library/view/~/9781439898789/?ar">https://learning.oreilly.com/library/view/~/9781439898789/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781439898789">https://learning.oreilly.com/library/view/~/9781439898789</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar">https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar</a><br/>Format: Electronic Resources<br/>Cyber crime and cyber terrorism investigator's handbookent://SD_ILS/0/SD_ILS:23041152025-07-04T12:43:38Z2025-07-04T12:43:38Zby Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007433/?ar">https://learning.oreilly.com/library/view/~/9780128007433/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780128007433/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007433/?ar</a><br/>Format: Electronic Resources<br/>Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspectsent://SD_ILS/0/SD_ILS:22980552025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499859/?ar">https://learning.oreilly.com/library/view/~/9781597499859/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499859">https://learning.oreilly.com/library/view/~/9781597499859</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23099952025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format: Electronic Resources<br/>Cybercrime investigation case studies : an excerpt from Placing the suspect behind the keyboardent://SD_ILS/0/SD_ILS:22985102025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9780124095052/?ar">https://learning.oreilly.com/library/view/~/9780124095052/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780124095052">https://learning.oreilly.com/library/view/~/9780124095052</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780124095052/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095052/?ar</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime.ent://SD_ILS/0/SD_ILS:22851492025-07-04T12:43:38Z2025-07-04T12:43:38Zby Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format: Electronic Resources<br/>Internet fraud casebook : the World Wide Web of deceitent://SD_ILS/0/SD_ILS:22893842025-07-04T12:43:38Z2025-07-04T12:43:38Zby Wells, Joseph T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar">https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470643631/?ar">https://learning.oreilly.com/library/view/~/9780470643631/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780470643631">https://learning.oreilly.com/library/view/~/9780470643631</a><br/>Format: Electronic Resources<br/>Windows registry forensics : advanced digital forensic analysis of the Windows registryent://SD_ILS/0/SD_ILS:23100182025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format: Electronic Resources<br/>Phishing exposedent://SD_ILS/0/SD_ILS:22819922025-07-04T12:43:38Z2025-07-04T12:43:38Zby James, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490306/?ar">https://learning.oreilly.com/library/view/~/9781597490306/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490306">https://learning.oreilly.com/library/view/~/9781597490306</a>
<a href="https://www.sciencedirect.com/science/book/9781597490306">https://www.sciencedirect.com/science/book/9781597490306</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar</a><br/>Format: Electronic Resources<br/>The true cost of information security breaches and cyber crimeent://SD_ILS/0/SD_ILS:23001992025-07-04T12:43:38Z2025-07-04T12:43:38Zby Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar">https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781849284967/?ar">https://learning.oreilly.com/library/view/~/9781849284967/?ar</a><br/>Format: Electronic Resources<br/>Network forensics : tracking hackers through cyberspaceent://SD_ILS/0/SD_ILS:22952752025-07-04T12:43:38Z2025-07-04T12:43:38Zby Davidoff, Sherri.<br/><a href="https://learning.oreilly.com/library/view/~/9780132565110/?ar">https://learning.oreilly.com/library/view/~/9780132565110/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780132565110/?ar">https://go.oreilly.com/library-access/library/view/-/9780132565110/?ar</a><br/>Format: Electronic Resources<br/>Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineersent://SD_ILS/0/SD_ILS:22966242025-07-04T12:43:38Z2025-07-04T12:43:38Zby O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format: Electronic Resources<br/>Learning Python for forensics : leverage the power of Python in forensic investigationsent://SD_ILS/0/SD_ILS:23191162025-07-04T12:43:38Z2025-07-04T12:43:38Zby Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format: Electronic Resources<br/>The future of cyber security and security innovation.ent://SD_ILS/0/SD_ILS:23088892025-07-04T12:43:38Z2025-07-04T12:43:38Zby Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis toolkitent://SD_ILS/0/SD_ILS:22958232025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format: Electronic Resources<br/>Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux toolsent://SD_ILS/0/SD_ILS:23153862025-07-04T12:43:38Z2025-07-04T12:43:38Zby Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a>
<a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format: Electronic Resources<br/>IOS forensic analysis for iPhone, iPad, and iPod Touchent://SD_ILS/0/SD_ILS:22912302025-07-04T12:43:38Z2025-07-04T12:43:38Zby Morrissey, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/9781430233428">https://learning.oreilly.com/library/view/~/9781430233428</a>
<a href="https://learning.oreilly.com/library/view/~/9781430233428/?ar">https://learning.oreilly.com/library/view/~/9781430233428/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar">https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar</a><br/>Format: Electronic Resources<br/>Windows forensic analysis DVD toolkit 2Eent://SD_ILS/0/SD_ILS:22878022025-07-04T12:43:38Z2025-07-04T12:43:38Zby Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format: Electronic Resources<br/>Mobile malware attacks and defenseent://SD_ILS/0/SD_ILS:22944762025-07-04T12:43:38Z2025-07-04T12:43:38Zby Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format: Electronic Resources<br/>Stealing the network : how to own an identityent://SD_ILS/0/SD_ILS:22819932025-07-04T12:43:38Z2025-07-04T12:43:38Zby Alder, Raven.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490061/?ar">https://learning.oreilly.com/library/view/~/9781597490061/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597490061">https://learning.oreilly.com/library/view/~/9781597490061</a>
<a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format: Electronic Resources<br/>Android forensics : investigation, analysis, and mobile security for Google Androident://SD_ILS/0/SD_ILS:22924922025-07-04T12:43:38Z2025-07-04T12:43:38Zby Hoog, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496513/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496513/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496513/?ar">https://learning.oreilly.com/library/view/~/9781597496513/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781597496513">https://learning.oreilly.com/library/view/~/9781597496513</a><br/>Format: Electronic Resources<br/>Malware forensics field guide for Linux systemsent://SD_ILS/0/SD_ILS:23023882025-07-04T12:43:38Z2025-07-04T12:43:38Zby Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format: Electronic Resources<br/>Scene of the cybercrime : computer forensics handbookent://SD_ILS/0/SD_ILS:22807562025-07-04T12:43:38Z2025-07-04T12:43:38Zby Shinder, Debra Littlejohn, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836654">https://learning.oreilly.com/library/view/~/9781931836654</a>
<a href="https://learning.oreilly.com/library/view/~/9781931836654/?ar">https://learning.oreilly.com/library/view/~/9781931836654/?ar</a>
<a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar</a><br/>Format: Electronic Resources<br/>Un monde sous surveillance ?ent://SD_ILS/0/SD_ILS:21960052025-07-04T12:43:38Z2025-07-04T12:43:38Zby Émilie Labrot<br/><a href="http://books.openedition.org/pupvd/3947">DOAB: download the publication</a>
<a href="https://directory.doabooks.org/handle/20.500.12854/53885">DOAB: description of the publication</a><br/>Format: Books<br/>