Arama Sonu&ccedil;ları Criminalit&eacute; informatique. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qu$003dCriminalit$0025C3$0025A9$002binformatique.$0026ps$003d300?dt=list 2025-07-04T12:43:38Z Blackhatonomics : an inside look at the economics of cybercrime ent://SD_ILS/0/SD_ILS:2298530 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Gragido, Will.<br/><a href="https://learning.oreilly.com/library/view/~/9781597497404/?ar">https://learning.oreilly.com/library/view/~/9781597497404/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497404/?ar</a><br/>Format:&#160;Electronic Resources<br/> The official CHFI study guide (Exam 312-49) : for computer hacking forensic investigator. ent://SD_ILS/0/SD_ILS:2283709 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Kleiman, Dave.<br/><a href="https://www.sciencedirect.com/science/book/9781597491976">https://www.sciencedirect.com/science/book/9781597491976</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491976/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491976/?ar">https://learning.oreilly.com/library/view/~/9781597491976/?ar</a><br/>Format:&#160;Electronic Resources<br/> SQL server forensic analysis ent://SD_ILS/0/SD_ILS:2286069 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Fowler, Kevvie.<br/><a href="https://learning.oreilly.com/library/view/~/9780321533203/?ar">https://learning.oreilly.com/library/view/~/9780321533203/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321533203/?ar">https://go.oreilly.com/library-access/library/view/-/9780321533203/?ar</a><br/>Format:&#160;Electronic Resources<br/> Intelligence-driven incident response : outwitting the adversary ent://SD_ILS/0/SD_ILS:2314035 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Roberts, Scott J., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491935187">https://learning.oreilly.com/library/view/~/9781491935187</a> <a href="https://learning.oreilly.com/library/view/~/9781491935187/?ar">https://learning.oreilly.com/library/view/~/9781491935187/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491935187/?ar">https://go.oreilly.com/library-access/library/view/-/9781491935187/?ar</a><br/>Format:&#160;Electronic Resources<br/> Who are the bad guys and what do they want? ent://SD_ILS/0/SD_ILS:2318638 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Fell, Gregory J., 1964- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042464">https://learning.oreilly.com/library/view/~/9781492042464</a> <a href="https://learning.oreilly.com/library/view/~/9781492042464/?ar">https://learning.oreilly.com/library/view/~/9781492042464/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042464/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing digital forensic readiness : from reactive to proactive process ent://SD_ILS/0/SD_ILS:2309988 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sachowski, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128045015/?ar">https://learning.oreilly.com/library/view/~/9780128045015/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128045015">https://learning.oreilly.com/library/view/~/9780128045015</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2304874 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Luttgens, Jason T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar">https://go.oreilly.com/library-access/library/view/-/9780071798686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071798686/?ar">https://learning.oreilly.com/library/view/~/9780071798686/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071798686">https://learning.oreilly.com/library/view/~/9780071798686</a><br/>Format:&#160;Electronic Resources<br/> The truth about avoiding scams ent://SD_ILS/0/SD_ILS:2284246 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Weisman, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9780768681871/?ar">https://learning.oreilly.com/library/view/~/9780768681871/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780768681871/?ar">https://go.oreilly.com/library-access/library/view/-/9780768681871/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital Forensics : threatscape and best practices ent://SD_ILS/0/SD_ILS:2309502 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sammons, John, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128045428">https://learning.oreilly.com/library/view/~/9780128045428</a> <a href="https://learning.oreilly.com/library/view/~/9780128045428/?ar">https://learning.oreilly.com/library/view/~/9780128045428/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128045428/?ar">https://go.oreilly.com/library-access/library/view/-/9780128045428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating internet crimes : an introduction to solving crimes in cyberspace ent://SD_ILS/0/SD_ILS:2300918 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shipley, Todd G.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078178">https://learning.oreilly.com/library/view/~/9780124078178</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078178/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124078178/?ar">https://learning.oreilly.com/library/view/~/9780124078178/?ar</a><br/>Format:&#160;Electronic Resources<br/> Suits and spooks conference : attacks, threats, and defense in cyberspace : complete video compliation. ent://SD_ILS/0/SD_ILS:2301909 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z <a href="https://learning.oreilly.com/videos/~/9781491946435">https://learning.oreilly.com/videos/~/9781491946435</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar">https://go.oreilly.com/library-access/library/view/-/9781491946435/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491946435/?ar">https://learning.oreilly.com/videos/~/9781491946435/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital forensics : the primer for getting started in digital forensics ent://SD_ILS/0/SD_ILS:2293807 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sammons, John.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496612">https://learning.oreilly.com/library/view/~/9781597496612</a> <a href="https://learning.oreilly.com/library/view/~/9781597496612/?ar">https://learning.oreilly.com/library/view/~/9781597496612/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496612/?ar</a><br/>Format:&#160;Electronic Resources<br/> The truth about computer scams ent://SD_ILS/0/SD_ILS:2291096 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Weisman, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132658270/?ar">https://go.oreilly.com/library-access/library/view/-/9780132658270/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132658270/?ar">https://learning.oreilly.com/library/view/~/9780132658270/?ar</a><br/>Format:&#160;Electronic Resources<br/> The best damn cybercrime and digital forensics book period ent://SD_ILS/0/SD_ILS:2285658 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Cardwell, Kevin.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492287/?ar">https://learning.oreilly.com/library/view/~/9781597492287/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492287/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492287/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital triage forensics : processing the digital crime scene ent://SD_ILS/0/SD_ILS:2290652 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Pearson, Stephen, 1963-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495967/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495967/?ar">https://learning.oreilly.com/library/view/~/9781597495967/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber crime fighters : tales from the trenches ent://SD_ILS/0/SD_ILS:2286713 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Donovan, Felicia.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780768687545/?ar">https://go.oreilly.com/library-access/library/view/-/9780768687545/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768687545/?ar">https://learning.oreilly.com/library/view/~/9780768687545/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780768687545">https://learning.oreilly.com/library/view/~/9780768687545</a><br/>Format:&#160;Electronic Resources<br/> Cyber mayday and the day after : a leader's guide to preparing, managing, and recovering from the inevitable business disruptions ent://SD_ILS/0/SD_ILS:2329799 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Lohrmann, Daniel J., 1963- author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119835301/?ar">https://learning.oreilly.com/library/view/~/9781119835301/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar">https://go.oreilly.com/library-access/library/view/-/9781119835301/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119835301">https://learning.oreilly.com/library/view/~/9781119835301</a><br/>Format:&#160;Electronic Resources<br/> Handbook of digital forensics and investigation ent://SD_ILS/0/SD_ILS:2289309 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Casey, Eoghan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123742674/?ar">https://go.oreilly.com/library-access/library/view/-/9780123742674/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123742674/?ar">https://learning.oreilly.com/library/view/~/9780123742674/?ar</a><br/>Format:&#160;Electronic Resources<br/> The dotCrime manifesto : how to stop Internet crime ent://SD_ILS/0/SD_ILS:2284397 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hallam-Baker, Phillip.<br/><a href="https://learning.oreilly.com/library/view/~/9780321552693/?ar">https://learning.oreilly.com/library/view/~/9780321552693/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321552693/?ar">https://go.oreilly.com/library-access/library/view/-/9780321552693/?ar</a><br/>Format:&#160;Electronic Resources<br/> The truth about avoiding credit scams : the essential truths in 20 minutes ent://SD_ILS/0/SD_ILS:2285268 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Weisman, Steve.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780137001873/?ar">https://go.oreilly.com/library-access/library/view/-/9780137001873/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780137001873/?ar">https://learning.oreilly.com/library/view/~/9780137001873/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber fraud tactics, techniques and procedures ent://SD_ILS/0/SD_ILS:2287651 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Howard, Rick.<br/><a href="https://learning.oreilly.com/library/view/~/9781420091281">https://learning.oreilly.com/library/view/~/9781420091281</a> <a href="https://learning.oreilly.com/library/view/~/9781420091281/?ar">https://learning.oreilly.com/library/view/~/9781420091281/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar">https://go.oreilly.com/library-access/library/view/-/9781420091281/?ar</a><br/>Format:&#160;Electronic Resources<br/> Ransomware : defending against digital extortion ent://SD_ILS/0/SD_ILS:2311973 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Liska, Allan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781491967874/?ar">https://learning.oreilly.com/library/view/~/9781491967874/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491967874">https://learning.oreilly.com/library/view/~/9781491967874</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar">https://go.oreilly.com/library-access/library/view/-/9781491967874/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malicious bots : an inside look into the cyber-criminal underground of the internet ent://SD_ILS/0/SD_ILS:2287034 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Dunham, Ken.<br/><a href="https://learning.oreilly.com/library/view/~/9781420069068/?ar">https://learning.oreilly.com/library/view/~/9781420069068/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420069068">https://learning.oreilly.com/library/view/~/9781420069068</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420069068/?ar">https://go.oreilly.com/library-access/library/view/-/9781420069068/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside cyber warfare ent://SD_ILS/0/SD_ILS:2294618 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carr, Jeffrey.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781449318475/?ar">https://go.oreilly.com/library-access/library/view/-/9781449318475/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781449318475/?ar">https://learning.oreilly.com/library/view/~/9781449318475/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer-Forensik : Computerstraftaten erkennen, ermitteln, aufkl&auml;ren ent://SD_ILS/0/SD_ILS:2302757 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Goschenneck, Alexander.<br/><a href="https://learning.oreilly.com/library/view/~/9781492014294/?ar">https://learning.oreilly.com/library/view/~/9781492014294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492014294/?ar">https://go.oreilly.com/library-access/library/view/-/9781492014294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:2285587 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Jakobsson, Markus.<br/><a href="https://learning.oreilly.com/library/view/~/9780321553744/?ar">https://learning.oreilly.com/library/view/~/9780321553744/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar">https://go.oreilly.com/library-access/library/view/-/9780321553744/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics basics : a practical guide using Windows OS ent://SD_ILS/0/SD_ILS:2319813 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hassan, Nihad A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238387/?ar">https://learning.oreilly.com/library/view/~/9781484238387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238387">https://learning.oreilly.com/library/view/~/9781484238387</a><br/>Format:&#160;Electronic Resources<br/> Mastering Windows network forensics and investigation ent://SD_ILS/0/SD_ILS:2299176 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Anson, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118236086/?ar">https://learning.oreilly.com/library/view/~/9781118236086/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar">https://go.oreilly.com/library-access/library/view/-/9781118236086/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fighting financial crimes with artificial intelligence ent://SD_ILS/0/SD_ILS:2320909 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Kureishy, Atif, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052678">https://learning.oreilly.com/library/view/~/9781492052678</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492052678/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052678/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492052678/?ar">https://learning.oreilly.com/library/view/~/9781492052678/?ar</a><br/>Format:&#160;Electronic Resources<br/> The cognitive early warning predictive system using the smart vaccine : the new digital immunity paradigm for smart cities and critical infrastructure ent://SD_ILS/0/SD_ILS:2313346 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Termanini, Rocky, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781498726535/?ar">https://learning.oreilly.com/library/view/~/9781498726535/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar">https://go.oreilly.com/library-access/library/view/-/9781498726535/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498726535">https://learning.oreilly.com/library/view/~/9781498726535</a><br/>Format:&#160;Electronic Resources<br/> Mobile forensic investigations : a guide to evidence collection, analysis, and presentation ent://SD_ILS/0/SD_ILS:2318685 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Reiber, Lee, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781260135107/?ar">https://go.oreilly.com/library-access/library/view/-/9781260135107/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781260135107/?ar">https://learning.oreilly.com/library/view/~/9781260135107/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics and digital investigation with EnCase Forensic v7 ent://SD_ILS/0/SD_ILS:2304830 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Widup, Suzanne.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar">https://go.oreilly.com/library-access/library/view/-/9780071807913/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071807913/?ar">https://learning.oreilly.com/library/view/~/9780071807913/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071807913">https://learning.oreilly.com/library/view/~/9780071807913</a><br/>Format:&#160;Electronic Resources<br/> Cyber Forensics, 2nd Edition ent://SD_ILS/0/SD_ILS:2324886 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Marcella, Albert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439848234">https://learning.oreilly.com/library/view/~/9781439848234</a> <a href="https://learning.oreilly.com/library/view/~/9781439848234/?ar">https://learning.oreilly.com/library/view/~/9781439848234/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439848234/?ar">https://go.oreilly.com/library-access/library/view/-/9781439848234/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime investigative case management : using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2298526 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shavers, Brett.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095069/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124095069">https://learning.oreilly.com/library/view/~/9780124095069</a> <a href="https://learning.oreilly.com/library/view/~/9780124095069/?ar">https://learning.oreilly.com/library/view/~/9780124095069/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber crime investigator's field guide ent://SD_ILS/0/SD_ILS:2281835 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Middleton, Bruce.<br/><a href="https://learning.oreilly.com/library/view/~/9781420031324/?ar">https://learning.oreilly.com/library/view/~/9781420031324/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420031324/?ar">https://go.oreilly.com/library-access/library/view/-/9781420031324/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781420031324">https://learning.oreilly.com/library/view/~/9781420031324</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime case presentation : using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2298517 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9780124095045/?ar">https://learning.oreilly.com/library/view/~/9780124095045/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124095045">https://learning.oreilly.com/library/view/~/9780124095045</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095045/?ar</a><br/>Format:&#160;Electronic Resources<br/> Patrolling the dark net : what you don't know will hurt you ent://SD_ILS/0/SD_ILS:2316656 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Barlow, Mike (Michael Alan), author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492042709/?ar">https://learning.oreilly.com/library/view/~/9781492042709/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492042709/?ar">https://go.oreilly.com/library-access/library/view/-/9781492042709/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital evidence and computer crime : forensic science, computers and the internet ent://SD_ILS/0/SD_ILS:2291516 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Casey, Eoghan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780123742681/?ar">https://go.oreilly.com/library-access/library/view/-/9780123742681/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780123742681/?ar">https://learning.oreilly.com/library/view/~/9780123742681/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : infoSec Pro guide ent://SD_ILS/0/SD_ILS:2299154 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Cowen, David.<br/><a href="https://learning.oreilly.com/library/view/~/9780071742450">https://learning.oreilly.com/library/view/~/9780071742450</a> <a href="https://learning.oreilly.com/library/view/~/9780071742450/?ar">https://learning.oreilly.com/library/view/~/9780071742450/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar">https://go.oreilly.com/library-access/library/view/-/9780071742450/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer-Forensik Hacks ent://SD_ILS/0/SD_ILS:2296229 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Kuhlee, Lorenz.<br/><a href="https://learning.oreilly.com/library/view/~/9783868997637">https://learning.oreilly.com/library/view/~/9783868997637</a> <a href="https://learning.oreilly.com/library/view/~/9783868997637/?ar">https://learning.oreilly.com/library/view/~/9783868997637/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar">https://go.oreilly.com/library-access/library/view/-/9783868997637/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity attacks (Red Team activity) ent://SD_ILS/0/SD_ILS:2315986 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Nesterenko, Sergii, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar">https://go.oreilly.com/library-access/library/view/-/9781788478878/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781788478878/?ar">https://learning.oreilly.com/videos/~/9781788478878/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital archaeology LiveLessons (sneak peek video training) : the art and science of digital forensics ent://SD_ILS/0/SD_ILS:2304261 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Graves, Michael W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132853835/?ar">https://go.oreilly.com/library-access/library/view/-/9780132853835/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780132853835/?ar">https://learning.oreilly.com/videos/~/9780132853835/?ar</a><br/>Format:&#160;Electronic Resources<br/> Virtualization and forensics : a digital forensic investigator's guide to virtual environments ent://SD_ILS/0/SD_ILS:2290041 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Barrett, Diane.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495578/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495578/?ar">https://learning.oreilly.com/library/view/~/9781597495578/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber Crisis ent://SD_ILS/0/SD_ILS:2331316 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Cole, Eric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781666125313">https://learning.oreilly.com/library/view/~/9781666125313</a> <a href="https://learning.oreilly.com/library/view/~/9781666125313/?ar">https://learning.oreilly.com/library/view/~/9781666125313/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar">https://go.oreilly.com/library-access/library/view/-/9781666125313/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Linux forensics : a guide for digital investigators ent://SD_ILS/0/SD_ILS:2329338 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Nikkel, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781098129781">https://learning.oreilly.com/library/view/~/9781098129781</a> <a href="https://learning.oreilly.com/library/view/~/9781098129781/?ar">https://learning.oreilly.com/library/view/~/9781098129781/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781098129781/?ar">https://go.oreilly.com/library-access/library/view/-/9781098129781/?ar</a><br/>Format:&#160;Electronic Resources<br/> Integrating Python with Leading Computer Forensics Platforms. ent://SD_ILS/0/SD_ILS:2311613 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128099506">https://learning.oreilly.com/library/view/~/9780128099506</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar">https://go.oreilly.com/library-access/library/view/-/9780128099506/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128099506/?ar">https://learning.oreilly.com/library/view/~/9780128099506/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyberwar and information warfare ent://SD_ILS/0/SD_ILS:2297556 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Ventre, Daniel.<br/><a href="https://learning.oreilly.com/library/view/~/9781118603512">https://learning.oreilly.com/library/view/~/9781118603512</a> <a href="https://learning.oreilly.com/library/view/~/9781118603512/?ar">https://learning.oreilly.com/library/view/~/9781118603512/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118603512/?ar">https://go.oreilly.com/library-access/library/view/-/9781118603512/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital archaeology : the art and science of digital forensics ent://SD_ILS/0/SD_ILS:2300173 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Graves, Michael W.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780132853774/?ar">https://go.oreilly.com/library-access/library/view/-/9780132853774/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132853774">https://learning.oreilly.com/library/view/~/9780132853774</a> <a href="https://learning.oreilly.com/library/view/~/9780132853774/?ar">https://learning.oreilly.com/library/view/~/9780132853774/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response ent://SD_ILS/0/SD_ILS:2296392 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Fichera, Joe, 1966-<br/><a href="https://learning.oreilly.com/library/view/~/9781597499620">https://learning.oreilly.com/library/view/~/9781597499620</a> <a href="https://learning.oreilly.com/library/view/~/9781597499620/?ar">https://learning.oreilly.com/library/view/~/9781597499620/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499620/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical cyber forensics : an incident-based approach to forensic investigations ent://SD_ILS/0/SD_ILS:2321521 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Reddy, Niranjan, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484244609/?ar">https://learning.oreilly.com/library/view/~/9781484244609/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar">https://go.oreilly.com/library-access/library/view/-/9781484244609/?ar</a><br/>Format:&#160;Electronic Resources<br/> A practical guide to computer forensics investigations ent://SD_ILS/0/SD_ILS:2305632 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hayes, Darren R., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780132756174/?ar">https://learning.oreilly.com/library/view/~/9780132756174/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar">https://go.oreilly.com/library-access/library/view/-/9780132756174/?ar</a><br/>Format:&#160;Electronic Resources<br/> The basics of digital forensics : the primer for getting started in digital forensics ent://SD_ILS/0/SD_ILS:2304547 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sammons, John, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128016350/?ar">https://go.oreilly.com/library-access/library/view/-/9780128016350/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128016350/?ar">https://learning.oreilly.com/library/view/~/9780128016350/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on incident response and digital forensics ent://SD_ILS/0/SD_ILS:2317114 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sheward, Mike, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781780174204/?ar">https://learning.oreilly.com/library/view/~/9781780174204/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780174204">https://learning.oreilly.com/library/view/~/9781780174204</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar">https://go.oreilly.com/library-access/library/view/-/9781780174204/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber-physical attack recovery procedures : a step-by-step preparation and response guide ent://SD_ILS/0/SD_ILS:2311018 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Ayala, Luis, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar">https://go.oreilly.com/library-access/library/view/-/9781484220658/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484220658/?ar">https://learning.oreilly.com/library/view/~/9781484220658/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics processing and procedures : meeting the requirements of ISO 17020, ISO 17025, ISO 27001 and best practice requirements ent://SD_ILS/0/SD_ILS:2301160 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Watson, David (David Lilburn)<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497428/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497428/?ar">https://learning.oreilly.com/library/view/~/9781597497428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile forensic investigations : a guide to evidence collection, analysis, and presentation ent://SD_ILS/0/SD_ILS:2309642 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Reiber, Lee, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071843645/?ar">https://go.oreilly.com/library-access/library/view/-/9780071843645/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071843645/?ar">https://learning.oreilly.com/library/view/~/9780071843645/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071843645">https://learning.oreilly.com/library/view/~/9780071843645</a><br/>Format:&#160;Electronic Resources<br/> Internet forensics ent://SD_ILS/0/SD_ILS:2282055 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Jones, Robert, 1957 July 15-<br/><a href="https://learning.oreilly.com/library/view/~/059610006X">https://learning.oreilly.com/library/view/~/059610006X</a> <a href="https://learning.oreilly.com/library/view/~/059610006X/?ar">https://learning.oreilly.com/library/view/~/059610006X/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/059610006X/?ar">https://go.oreilly.com/library-access/library/view/-/059610006X/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat intelligence in practice : a practical guide to threat intelligence from successful organizations ent://SD_ILS/0/SD_ILS:2318435 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Liska, Allan, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar">https://go.oreilly.com/library-access/library/view/-/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302/?ar">https://learning.oreilly.com/library/view/~/9781492049302/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492049302">https://learning.oreilly.com/library/view/~/9781492049302</a><br/>Format:&#160;Electronic Resources<br/> CCFP certified cyber forensics professional certification : exam guide ent://SD_ILS/0/SD_ILS:2304836 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Easttom, Chuck.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780071839761/?ar">https://go.oreilly.com/library-access/library/view/-/9780071839761/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780071839761/?ar">https://learning.oreilly.com/library/view/~/9780071839761/?ar</a><br/>Format:&#160;Electronic Resources<br/> Post-incident reviews : learning from failure for improved incident response ent://SD_ILS/0/SD_ILS:2318499 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hand, Jason, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar">https://go.oreilly.com/library-access/library/view/-/9781491986998/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998">https://learning.oreilly.com/library/view/~/9781491986998</a> <a href="https://learning.oreilly.com/library/view/~/9781491986998/?ar">https://learning.oreilly.com/library/view/~/9781491986998/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer incident response and forensics team management : conducting a successful incident response ent://SD_ILS/0/SD_ILS:2300670 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Johnson, Leighton, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965/?ar">https://learning.oreilly.com/library/view/~/9781597499965/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499965">https://learning.oreilly.com/library/view/~/9781597499965</a><br/>Format:&#160;Electronic Resources<br/> Investigative computer forensics : the practical guide for lawyers, accountants, investigators, and business ent://SD_ILS/0/SD_ILS:2296328 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Laykin, Erik.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar">https://go.oreilly.com/library-access/library/view/-/9781118235225/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118235225/?ar">https://learning.oreilly.com/library/view/~/9781118235225/?ar</a><br/>Format:&#160;Electronic Resources<br/> CD and DVD forensics ent://SD_ILS/0/SD_ILS:2283563 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Crowley, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781597491280/?ar">https://learning.oreilly.com/library/view/~/9781597491280/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597491280/?ar">https://go.oreilly.com/library-access/library/view/-/9781597491280/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597491280">https://learning.oreilly.com/library/view/~/9781597491280</a> <a href="https://www.sciencedirect.com/science/book/9781597491280">https://www.sciencedirect.com/science/book/9781597491280</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime : wie Sie Gefahren im Internet erkennen und sich sch&uuml;tzen ent://SD_ILS/0/SD_ILS:2323012 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Schuh, J&uuml;rgen, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781098123697/?ar">https://go.oreilly.com/library-access/library/view/-/9781098123697/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123697/?ar">https://learning.oreilly.com/library/view/~/9781098123697/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781098123697">https://learning.oreilly.com/library/view/~/9781098123697</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and cyber crime with Kali Linux fundamentals ent://SD_ILS/0/SD_ILS:2314043 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Muniz, Joseph, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar">https://go.oreilly.com/library-access/library/view/-/9780134693644/?ar</a> <a href="https://learning.oreilly.com/videos/~/9780134693644/?ar">https://learning.oreilly.com/videos/~/9780134693644/?ar</a><br/>Format:&#160;Electronic Resources<br/> The second economy : the race for trust, treasure and time in the cybersecurity war ent://SD_ILS/0/SD_ILS:2312552 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Grobman, Steve, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781484222294/?ar">https://learning.oreilly.com/library/view/~/9781484222294/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar">https://go.oreilly.com/library-access/library/view/-/9781484222294/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics explained ent://SD_ILS/0/SD_ILS:2318023 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Gogolin, Greg, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781439874950/?ar">https://learning.oreilly.com/library/view/~/9781439874950/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar">https://go.oreilly.com/library-access/library/view/-/9781439874950/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439874950">https://learning.oreilly.com/library/view/~/9781439874950</a><br/>Format:&#160;Electronic Resources<br/> Malware : Fighting Malicious Code. ent://SD_ILS/0/SD_ILS:2317983 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Skoudis, Ed, author.<br/><a href="https://learning.oreilly.com/library/view/~/0131014056">https://learning.oreilly.com/library/view/~/0131014056</a> <a href="https://learning.oreilly.com/library/view/~/0131014056/?ar">https://learning.oreilly.com/library/view/~/0131014056/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0131014056/?ar">https://go.oreilly.com/library-access/library/view/-/0131014056/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity incident response : how to contain, eradicate, and recover from incidents ent://SD_ILS/0/SD_ILS:2317670 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Thompson, Eric C., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar">https://go.oreilly.com/library-access/library/view/-/9781484238707/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781484238707/?ar">https://learning.oreilly.com/library/view/~/9781484238707/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber security : a practitioner's guide ent://SD_ILS/0/SD_ILS:2313763 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sutton, David (Information security practitioner), author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar">https://go.oreilly.com/library-access/library/view/-/9781780173405/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781780173405/?ar">https://learning.oreilly.com/library/view/~/9781780173405/?ar</a><br/>Format:&#160;Electronic Resources<br/> Software piracy exposed ent://SD_ILS/0/SD_ILS:2281995 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Craig, Paul.<br/><a href="https://learning.oreilly.com/library/view/~/9781932266986">https://learning.oreilly.com/library/view/~/9781932266986</a> <a href="https://www.sciencedirect.com/science/book/9781932266986">https://www.sciencedirect.com/science/book/9781932266986</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar">https://go.oreilly.com/library-access/library/view/-/9781932266986/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781932266986/?ar">https://learning.oreilly.com/library/view/~/9781932266986/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity Ops with bash : attack, defend, and analyze from the command line ent://SD_ILS/0/SD_ILS:2319252 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Troncone, Paul, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar">https://go.oreilly.com/library-access/library/view/-/9781492041306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306">https://learning.oreilly.com/library/view/~/9781492041306</a> <a href="https://learning.oreilly.com/library/view/~/9781492041306/?ar">https://learning.oreilly.com/library/view/~/9781492041306/?ar</a><br/>Format:&#160;Electronic Resources<br/> Techno security's guide to e-discovery and digital forensics ent://SD_ILS/0/SD_ILS:2284514 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Wiles, Jack.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492232">https://learning.oreilly.com/library/view/~/9781597492232</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492232/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492232/?ar">https://learning.oreilly.com/library/view/~/9781597492232/?ar</a><br/>Format:&#160;Electronic Resources<br/> Big data analytics with applications in insider threat detection ent://SD_ILS/0/SD_ILS:2315463 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Thuraisingham, Bhavani M., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar">https://go.oreilly.com/library-access/library/view/-/9781351645768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781351645768/?ar">https://learning.oreilly.com/library/view/~/9781351645768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cloud storage forensics ent://SD_ILS/0/SD_ILS:2302507 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Quick, Darren.<br/><a href="https://learning.oreilly.com/library/view/~/9780124199705/?ar">https://learning.oreilly.com/library/view/~/9780124199705/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124199705/?ar">https://go.oreilly.com/library-access/library/view/-/9780124199705/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics for dummies ent://SD_ILS/0/SD_ILS:2285672 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Volonino, Linda.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar">https://go.oreilly.com/library-access/library/view/-/9780470371916/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470371916/?ar">https://learning.oreilly.com/library/view/~/9780470371916/?ar</a><br/>Format:&#160;Electronic Resources<br/> Python digital forensics cookbook : effective Python recipes for digital investigations ent://SD_ILS/0/SD_ILS:2314453 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Miller, Preston, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781783987467/?ar">https://go.oreilly.com/library-access/library/view/-/9781783987467/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783987467">https://learning.oreilly.com/library/view/~/9781783987467</a> <a href="https://learning.oreilly.com/library/view/~/9781783987467/?ar">https://learning.oreilly.com/library/view/~/9781783987467/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensics cookbook : 61 recipes to help you analyze Windows systems ent://SD_ILS/0/SD_ILS:2313990 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sulkin, Oleg, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar">https://go.oreilly.com/library-access/library/view/-/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495/?ar">https://learning.oreilly.com/library/view/~/9781784390495/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781784390495">https://learning.oreilly.com/library/view/~/9781784390495</a><br/>Format:&#160;Electronic Resources<br/> Executing Windows command line investigations : while ensuring evidentiary integrity ent://SD_ILS/0/SD_ILS:2310806 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hosmer, Chet.<br/><a href="https://learning.oreilly.com/library/view/~/9780128092712">https://learning.oreilly.com/library/view/~/9780128092712</a> <a href="https://learning.oreilly.com/library/view/~/9780128092712/?ar">https://learning.oreilly.com/library/view/~/9780128092712/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar">https://go.oreilly.com/library-access/library/view/-/9780128092712/?ar</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Windows systems : digital forensics field guides ent://SD_ILS/0/SD_ILS:2294682 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Malin, Cameron H.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724/?ar">https://learning.oreilly.com/library/view/~/9781597494724/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494724">https://learning.oreilly.com/library/view/~/9781597494724</a><br/>Format:&#160;Electronic Resources<br/> Xbox 360 forensics : a digital forensics guide to examining artifacts ent://SD_ILS/0/SD_ILS:2290978 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Bolt, Steven.<br/><a href="https://learning.oreilly.com/library/view/~/9781597496230">https://learning.oreilly.com/library/view/~/9781597496230</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496230/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496230/?ar">https://learning.oreilly.com/library/view/~/9781597496230/?ar</a><br/>Format:&#160;Electronic Resources<br/> Fraud detection without feature engineering ent://SD_ILS/0/SD_ILS:2322434 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Vagata, Pamela, on-screen presenter.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar">https://go.oreilly.com/library-access/library/view/-/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540/?ar">https://learning.oreilly.com/videos/~/0636920339540/?ar</a> <a href="https://learning.oreilly.com/videos/~/0636920339540">https://learning.oreilly.com/videos/~/0636920339540</a><br/>Format:&#160;Electronic Resources<br/> Cybersecurity, attack and defense strategies : infrastructure security with Red Team and Blue Team tactics ent://SD_ILS/0/SD_ILS:2315706 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Diogenes, Yuri, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788475297/?ar">https://learning.oreilly.com/library/view/~/9781788475297/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar">https://go.oreilly.com/library-access/library/view/-/9781788475297/?ar</a><br/>Format:&#160;Electronic Resources<br/> A comprehensive look at fraud identification and prevention ent://SD_ILS/0/SD_ILS:2307561 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Youngblood, James, 1960-<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781498700320/?ar">https://go.oreilly.com/library-access/library/view/-/9781498700320/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781498700320">https://learning.oreilly.com/library/view/~/9781498700320</a> <a href="https://learning.oreilly.com/library/view/~/9781498700320/?ar">https://learning.oreilly.com/library/view/~/9781498700320/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response primer : how to keep from getting pwned too hard ent://SD_ILS/0/SD_ILS:2323316 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Messier, Ric, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492073659/?ar">https://learning.oreilly.com/library/view/~/9781492073659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar">https://go.oreilly.com/library-access/library/view/-/9781492073659/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492073659">https://learning.oreilly.com/library/view/~/9781492073659</a><br/>Format:&#160;Electronic Resources<br/> Learning computer forensics ent://SD_ILS/0/SD_ILS:2298554 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Messier, Ric.<br/><a href="https://learning.oreilly.com/videos/~/9781771370615/?ar">https://learning.oreilly.com/videos/~/9781771370615/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar">https://go.oreilly.com/library-access/library/view/-/9781771370615/?ar</a><br/>Format:&#160;Electronic Resources<br/> Jissen bash ni yoru saibā sekyuriti taisaku : sekyuriti gijutsusha no tame no sheru sukuriputo katsuyōjutsu ent://SD_ILS/0/SD_ILS:2332657 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Troncone, Paul, author.<br/><a href="https://learning.oreilly.com/library/view/~/9784873119052/?ar">https://learning.oreilly.com/library/view/~/9784873119052/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar">https://go.oreilly.com/library-access/library/view/-/9784873119052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9784873119052">https://learning.oreilly.com/library/view/~/9784873119052</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics with open source tools : using open source platform tools for performing computer forensics on target systems : Windows, Mac, Linux, UNIX, etc. ent://SD_ILS/0/SD_ILS:2291221 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Altheide, Cory.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495868/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495868/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495868/?ar">https://learning.oreilly.com/library/view/~/9781597495868/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495868">https://learning.oreilly.com/library/view/~/9781597495868</a><br/>Format:&#160;Electronic Resources<br/> Unix and Linux forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:2286445 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Pogue, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492690/?ar">https://learning.oreilly.com/library/view/~/9781597492690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492690/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492690/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492690">https://learning.oreilly.com/library/view/~/9781597492690</a><br/>Format:&#160;Electronic Resources<br/> Contemporary digital forensic investigations of cloud and mobile applications ent://SD_ILS/0/SD_ILS:2312008 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Choo, Kim-Kwang Raymond, editor.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar">https://go.oreilly.com/library-access/library/view/-/9780128054482/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128054482/?ar">https://learning.oreilly.com/library/view/~/9780128054482/?ar</a><br/>Format:&#160;Electronic Resources<br/> What every engineer should know about cyber security and digital forensics ent://SD_ILS/0/SD_ILS:2301474 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;DeFranco, Joanna F.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar">https://go.oreilly.com/library-access/library/view/-/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527/?ar">https://learning.oreilly.com/library/view/~/9781466564527/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781466564527">https://learning.oreilly.com/library/view/~/9781466564527</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics jumpstart ent://SD_ILS/0/SD_ILS:2291436 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Solomon, Michael (Michael G.), 1963-<br/><a href="https://learning.oreilly.com/library/view/~/9781118067659/?ar">https://learning.oreilly.com/library/view/~/9781118067659/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118067659/?ar">https://go.oreilly.com/library-access/library/view/-/9781118067659/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics and incident response : an intelligent way to respond to attacks ent://SD_ILS/0/SD_ILS:2313915 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Johansen, Gerard, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781787288683">https://learning.oreilly.com/library/view/~/9781787288683</a> <a href="https://learning.oreilly.com/library/view/~/9781787288683/?ar">https://learning.oreilly.com/library/view/~/9781787288683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar">https://go.oreilly.com/library-access/library/view/-/9781787288683/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:2289149 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Lillard, Terrence.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387/?ar">https://learning.oreilly.com/library/view/~/9781597495387/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495387">https://learning.oreilly.com/library/view/~/9781597495387</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics : investigating and analyzing malicious code ent://SD_ILS/0/SD_ILS:2285693 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Aquilina, James M.<br/><a href="https://learning.oreilly.com/library/view/~/9781597492683/?ar">https://learning.oreilly.com/library/view/~/9781597492683/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492683/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492683">https://learning.oreilly.com/library/view/~/9781597492683</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the V3rb0ten network ent://SD_ILS/0/SD_ILS:2309296 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Street, Jayson E., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128042823/?ar">https://learning.oreilly.com/library/view/~/9780128042823/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar">https://go.oreilly.com/library-access/library/view/-/9780128042823/?ar</a><br/>Format:&#160;Electronic Resources<br/> EnCase computer forensics : the official EnCE : EnCase certified examiner study guide ent://SD_ILS/0/SD_ILS:2296295 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Bunting, Steve.<br/><a href="https://learning.oreilly.com/library/view/~/9781118058985/?ar">https://learning.oreilly.com/library/view/~/9781118058985/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118058985/?ar">https://go.oreilly.com/library-access/library/view/-/9781118058985/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hunting cyber criminals : a hacker's guide to online intelligence gathering tools and techniques ent://SD_ILS/0/SD_ILS:2322944 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Troia, Vinny, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781119540922/?ar">https://go.oreilly.com/library-access/library/view/-/9781119540922/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119540922">https://learning.oreilly.com/library/view/~/9781119540922</a> <a href="https://learning.oreilly.com/library/view/~/9781119540922/?ar">https://learning.oreilly.com/library/view/~/9781119540922/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber forensics : from data to digital evidence ent://SD_ILS/0/SD_ILS:2293162 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Marcella, Albert J.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118273661/?ar">https://go.oreilly.com/library-access/library/view/-/9781118273661/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118273661/?ar">https://learning.oreilly.com/library/view/~/9781118273661/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118273661">https://learning.oreilly.com/library/view/~/9781118273661</a><br/>Format:&#160;Electronic Resources<br/> Cisco router and switch forensics : investigating and analyzing malicious network activity ent://SD_ILS/0/SD_ILS:2287180 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Liu, Dale.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494182">https://learning.oreilly.com/library/view/~/9781597494182</a> <a href="https://learning.oreilly.com/library/view/~/9781597494182/?ar">https://learning.oreilly.com/library/view/~/9781597494182/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494182/?ar</a><br/>Format:&#160;Electronic Resources<br/> Wireless crime and forensic investigation ent://SD_ILS/0/SD_ILS:2283008 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Kipper, Gregory.<br/><a href="https://learning.oreilly.com/library/view/~/9781420013016">https://learning.oreilly.com/library/view/~/9781420013016</a> <a href="https://learning.oreilly.com/library/view/~/9781420013016/?ar">https://learning.oreilly.com/library/view/~/9781420013016/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781420013016/?ar">https://go.oreilly.com/library-access/library/view/-/9781420013016/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical Windows forensics : leverage the power of digital forensics for Windows systems ent://SD_ILS/0/SD_ILS:2311021 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shaaban, Ayman, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781783554096">https://learning.oreilly.com/library/view/~/9781783554096</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar">https://go.oreilly.com/library-access/library/view/-/9781783554096/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781783554096/?ar">https://learning.oreilly.com/library/view/~/9781783554096/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mac OS X, iPod, and iPhone forensic analysis DVD toolkit ent://SD_ILS/0/SD_ILS:2287201 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Kubasiak, Ryan R.<br/><a href="https://learning.oreilly.com/library/view/~/9780080949185/?ar">https://learning.oreilly.com/library/view/~/9780080949185/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780080949185">https://learning.oreilly.com/library/view/~/9780080949185</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar">https://go.oreilly.com/library-access/library/view/-/9780080949185/?ar</a><br/>Format:&#160;Electronic Resources<br/> This machine kills secrets ent://SD_ILS/0/SD_ILS:2304292 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Greenberg, Andy.<br/><a href="https://learning.oreilly.com/library/view/~/9781452629902">https://learning.oreilly.com/library/view/~/9781452629902</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781452629902/?ar">https://go.oreilly.com/library-access/library/view/-/9781452629902/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781452629902/?ar">https://learning.oreilly.com/library/view/~/9781452629902/?ar</a><br/>Format:&#160;Sound recording<br/> Cybercrime and espionage : an analysis of subversive multi-vector threats ent://SD_ILS/0/SD_ILS:2290838 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Gragido, Will.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496148/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496148">https://learning.oreilly.com/library/view/~/9781597496148</a> <a href="https://learning.oreilly.com/library/view/~/9781597496148/?ar">https://learning.oreilly.com/library/view/~/9781597496148/?ar</a><br/>Format:&#160;Electronic Resources<br/> Inside cyber warfare ent://SD_ILS/0/SD_ILS:2287453 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carr, Jeffrey.<br/><a href="https://learning.oreilly.com/library/view/~/9781449318475">https://learning.oreilly.com/library/view/~/9781449318475</a> <a href="https://learning.oreilly.com/library/view/~/9781449377229">https://learning.oreilly.com/library/view/~/9781449377229</a> <a href="https://learning.oreilly.com/library/view/~/9781449377229/?ar">https://learning.oreilly.com/library/view/~/9781449377229/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar">https://go.oreilly.com/library-access/library/view/-/9781449377229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Incident response &amp; computer forensics ent://SD_ILS/0/SD_ILS:2280958 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Prosise, Chris.<br/><a href="https://learning.oreilly.com/library/view/~/9780072226966">https://learning.oreilly.com/library/view/~/9780072226966</a> <a href="https://learning.oreilly.com/library/view/~/9780072226966/?ar">https://learning.oreilly.com/library/view/~/9780072226966/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar">https://go.oreilly.com/library-access/library/view/-/9780072226966/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mining the social web, mailboxes : learn to analyze and query large volumes of email using Python and Pandas ent://SD_ILS/0/SD_ILS:2314279 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Klassen, Mikhail, speaker.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781491989906/?ar">https://go.oreilly.com/library-access/library/view/-/9781491989906/?ar</a> <a href="https://learning.oreilly.com/videos/~/9781491989906/?ar">https://learning.oreilly.com/videos/~/9781491989906/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:2302592 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carvey, Harlan A., author.<br/><a href="https://learning.oreilly.com/library/view/~/9780124171572/?ar">https://learning.oreilly.com/library/view/~/9780124171572/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar">https://go.oreilly.com/library-access/library/view/-/9780124171572/?ar</a><br/>Format:&#160;Electronic Resources<br/> Managing information security breaches : studies from real life ent://SD_ILS/0/SD_ILS:2308836 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Krausz, Michael, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781849285964/?ar">https://learning.oreilly.com/library/view/~/9781849285964/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar">https://go.oreilly.com/library-access/library/view/-/9781849285964/?ar</a><br/>Format:&#160;Electronic Resources<br/> Data breaches : crisis and opportunity ent://SD_ILS/0/SD_ILS:2322222 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Davidoff, Sherri, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar">https://go.oreilly.com/library-access/library/view/-/9780135964255/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780135964255/?ar">https://learning.oreilly.com/library/view/~/9780135964255/?ar</a><br/>Format:&#160;Electronic Resources<br/> Introduction to cyber-warfare : a multidisciplinary approach ent://SD_ILS/0/SD_ILS:2300196 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shakarian, Paulo.<br/><a href="https://learning.oreilly.com/library/view/~/9780124078147">https://learning.oreilly.com/library/view/~/9780124078147</a> <a href="https://learning.oreilly.com/library/view/~/9780124078147/?ar">https://learning.oreilly.com/library/view/~/9780124078147/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar">https://go.oreilly.com/library-access/library/view/-/9780124078147/?ar</a><br/>Format:&#160;Electronic Resources<br/> Hands-on network forensics : investigate network attacks and find evidence using common network forensic tools ent://SD_ILS/0/SD_ILS:2319836 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Jaswal, Nipun, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar">https://go.oreilly.com/library-access/library/view/-/9781789344523/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781789344523/?ar">https://learning.oreilly.com/library/view/~/9781789344523/?ar</a><br/>Format:&#160;Electronic Resources<br/> Protecting your web applications : solutions and strategies to combat cybersecurity threats ent://SD_ILS/0/SD_ILS:2321166 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sloper, Gary, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492052791">https://learning.oreilly.com/library/view/~/9781492052791</a> <a href="https://learning.oreilly.com/library/view/~/9781492052791/?ar">https://learning.oreilly.com/library/view/~/9781492052791/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar">https://go.oreilly.com/library-access/library/view/-/9781492052791/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of memory forensics : detecting malware and threats in Windows, Linux, and Mac memory ent://SD_ILS/0/SD_ILS:2306747 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Ligh, Michael Hale.<br/><a href="https://learning.oreilly.com/library/view/~/9781118824993/?ar">https://learning.oreilly.com/library/view/~/9781118824993/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar">https://go.oreilly.com/library-access/library/view/-/9781118824993/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer incident response and product security ent://SD_ILS/0/SD_ILS:2291715 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Rajnovic, Damir, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9780132491518">https://learning.oreilly.com/library/view/~/9780132491518</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar">https://go.oreilly.com/library-access/library/view/-/9780132491518/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780132491518/?ar">https://learning.oreilly.com/library/view/~/9780132491518/?ar</a><br/>Format:&#160;Electronic Resources<br/> Investigating cryptocurrencies : understanding, extracting, and analyzing blockchain evidence ent://SD_ILS/0/SD_ILS:2316405 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Furneaux, Nick, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119480587/?ar">https://learning.oreilly.com/library/view/~/9781119480587/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119480587/?ar">https://go.oreilly.com/library-access/library/view/-/9781119480587/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781119480587">https://learning.oreilly.com/library/view/~/9781119480587</a><br/>Format:&#160;Electronic Resources<br/> The cyber risk handbook : creating and measuring effective cybersecurity capabilities ent://SD_ILS/0/SD_ILS:2312989 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Antonucci, Domenic, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781119308805">https://learning.oreilly.com/library/view/~/9781119308805</a> <a href="https://learning.oreilly.com/library/view/~/9781119308805/?ar">https://learning.oreilly.com/library/view/~/9781119308805/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar">https://go.oreilly.com/library-access/library/view/-/9781119308805/?ar</a><br/>Format:&#160;Electronic Resources<br/> Practical forensic imaging : securing digital evidence with Linux tools ent://SD_ILS/0/SD_ILS:2311039 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Nikkel, Bruce, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492018049/?ar">https://learning.oreilly.com/library/view/~/9781492018049/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492018049/?ar">https://go.oreilly.com/library-access/library/view/-/9781492018049/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781492018049">https://learning.oreilly.com/library/view/~/9781492018049</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : a pocket guide ent://SD_ILS/0/SD_ILS:2289616 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Clarke, Nathan.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281607/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281607/?ar">https://learning.oreilly.com/library/view/~/9781849281607/?ar</a><br/>Format:&#160;Electronic Resources<br/> How personal &amp; Internet security works ent://SD_ILS/0/SD_ILS:2282444 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Gralla, Preston.<br/><a href="https://learning.oreilly.com/library/view/~/0789735539/?ar">https://learning.oreilly.com/library/view/~/0789735539/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/0789735539/?ar">https://go.oreilly.com/library-access/library/view/-/0789735539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Implementing digital forensic readiness : from reactive to proactive process ent://SD_ILS/0/SD_ILS:2318486 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Sachowski, Jason, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780429805820">https://learning.oreilly.com/library/view/~/9780429805820</a> <a href="https://learning.oreilly.com/library/view/~/9780429805820/?ar">https://learning.oreilly.com/library/view/~/9780429805820/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780429805820/?ar">https://go.oreilly.com/library-access/library/view/-/9780429805820/?ar</a><br/>Format:&#160;Electronic Resources<br/> The Internet and society a reference handbook ent://SD_ILS/0/SD_ILS:280087 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Schell, Bernadette H. (Bernadette Hlubik), 1952-<br/>EBSCOhost <a href="http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186374">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=186374</a><br/>Format:&#160;Electronic Resources<br/> Managing Information Security Breaches : Studies from Real Life. ent://SD_ILS/0/SD_ILS:2290674 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar">https://go.oreilly.com/library-access/library/view/-/9781849281539/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849281539/?ar">https://learning.oreilly.com/library/view/~/9781849281539/?ar</a><br/>Format:&#160;Electronic Resources<br/> Computer forensics : evidence collection and management ent://SD_ILS/0/SD_ILS:2290148 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Newman, Robert C.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780849305627/?ar">https://go.oreilly.com/library-access/library/view/-/9780849305627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780849305627/?ar">https://learning.oreilly.com/library/view/~/9780849305627/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780849305627">https://learning.oreilly.com/library/view/~/9780849305627</a><br/>Format:&#160;Electronic Resources<br/> Learning network forensics : identify and safeguard your network against both internal and external threats, hackers, and malware attacks ent://SD_ILS/0/SD_ILS:2310121 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Datt, Samir, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar">https://go.oreilly.com/library-access/library/view/-/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905/?ar">https://learning.oreilly.com/library/view/~/9781782174905/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781782174905">https://learning.oreilly.com/library/view/~/9781782174905</a><br/>Format:&#160;Electronic Resources<br/> Cyberpsychology : the study of individuals, society and digital technologies ent://SD_ILS/0/SD_ILS:2312330 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Whitty, Monica T., 1969- author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470975626/?ar">https://go.oreilly.com/library-access/library/view/-/9780470975626/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470975626/?ar">https://learning.oreilly.com/library/view/~/9780470975626/?ar</a><br/>Format:&#160;Electronic Resources<br/> Machine Learning Forensics for Law Enforcement, Security, and Intelligence ent://SD_ILS/0/SD_ILS:2313563 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Mena, Jesus, author<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar">https://go.oreilly.com/library-access/library/view/-/9781439860700/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439860700">https://learning.oreilly.com/library/view/~/9781439860700</a> <a href="https://learning.oreilly.com/library/view/~/9781439860700/?ar">https://learning.oreilly.com/library/view/~/9781439860700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber reconnaissance surveillance and defense ent://SD_ILS/0/SD_ILS:2304979 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shimonski, Robert, author.<br/><a href="https://learning.oreilly.com/library/view/~/9780128013083">https://learning.oreilly.com/library/view/~/9780128013083</a> <a href="https://learning.oreilly.com/library/view/~/9780128013083/?ar">https://learning.oreilly.com/library/view/~/9780128013083/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar">https://go.oreilly.com/library-access/library/view/-/9780128013083/?ar</a><br/>Format:&#160;Electronic Resources<br/> Dissecting the hack : the f0rb1dd3n network ent://SD_ILS/0/SD_ILS:2290700 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Street, Jayson E.<br/><a href="https://learning.oreilly.com/library/view/~/9781597495684/?ar">https://learning.oreilly.com/library/view/~/9781597495684/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495684/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics for handheld devices ent://SD_ILS/0/SD_ILS:2295476 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Doherty, Eamon P.<br/><a href="https://learning.oreilly.com/library/view/~/9781439898789/?ar">https://learning.oreilly.com/library/view/~/9781439898789/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781439898789">https://learning.oreilly.com/library/view/~/9781439898789</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar">https://go.oreilly.com/library-access/library/view/-/9781439898789/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cyber crime and cyber terrorism investigator's handbook ent://SD_ILS/0/SD_ILS:2304115 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Akhgar, Babak, editor.<br/><a href="https://learning.oreilly.com/library/view/~/9780128007433/?ar">https://learning.oreilly.com/library/view/~/9780128007433/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780128007433/?ar">https://go.oreilly.com/library-access/library/view/-/9780128007433/?ar</a><br/>Format:&#160;Electronic Resources<br/> Placing the suspect behind the keyboard : using digital forensics and investigative techniques to identify cybercrime suspects ent://SD_ILS/0/SD_ILS:2298055 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499859/?ar">https://learning.oreilly.com/library/view/~/9781597499859/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499859/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499859">https://learning.oreilly.com/library/view/~/9781597499859</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2309995 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar">https://go.oreilly.com/library-access/library/view/-/9781597495806/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597495806/?ar">https://learning.oreilly.com/library/view/~/9781597495806/?ar</a><br/>Format:&#160;Electronic Resources<br/> Cybercrime investigation case studies : an excerpt from Placing the suspect behind the keyboard ent://SD_ILS/0/SD_ILS:2298510 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shavers, Brett.<br/><a href="https://learning.oreilly.com/library/view/~/9780124095052/?ar">https://learning.oreilly.com/library/view/~/9780124095052/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780124095052">https://learning.oreilly.com/library/view/~/9780124095052</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780124095052/?ar">https://go.oreilly.com/library-access/library/view/-/9780124095052/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime. ent://SD_ILS/0/SD_ILS:2285149 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Cross, Michael, 1965-<br/><a href="https://learning.oreilly.com/library/view/~/9781597492768">https://learning.oreilly.com/library/view/~/9781597492768</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492768/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492768/?ar">https://learning.oreilly.com/library/view/~/9781597492768/?ar</a><br/>Format:&#160;Electronic Resources<br/> Internet fraud casebook : the World Wide Web of deceit ent://SD_ILS/0/SD_ILS:2289384 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Wells, Joseph T.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar">https://go.oreilly.com/library-access/library/view/-/9780470643631/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470643631/?ar">https://learning.oreilly.com/library/view/~/9780470643631/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780470643631">https://learning.oreilly.com/library/view/~/9780470643631</a><br/>Format:&#160;Electronic Resources<br/> Windows registry forensics : advanced digital forensic analysis of the Windows registry ent://SD_ILS/0/SD_ILS:2310018 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carvey, Harlan A., author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar">https://go.oreilly.com/library-access/library/view/-/9780128033357/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9780128033357/?ar">https://learning.oreilly.com/library/view/~/9780128033357/?ar</a><br/>Format:&#160;Electronic Resources<br/> Phishing exposed ent://SD_ILS/0/SD_ILS:2281992 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;James, Lance.<br/><a href="https://learning.oreilly.com/library/view/~/9781597490306/?ar">https://learning.oreilly.com/library/view/~/9781597490306/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490306">https://learning.oreilly.com/library/view/~/9781597490306</a> <a href="https://www.sciencedirect.com/science/book/9781597490306">https://www.sciencedirect.com/science/book/9781597490306</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490306/?ar</a><br/>Format:&#160;Electronic Resources<br/> The true cost of information security breaches and cyber crime ent://SD_ILS/0/SD_ILS:2300199 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Krausz, Michael.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar">https://go.oreilly.com/library-access/library/view/-/9781849284967/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781849284967/?ar">https://learning.oreilly.com/library/view/~/9781849284967/?ar</a><br/>Format:&#160;Electronic Resources<br/> Network forensics : tracking hackers through cyberspace ent://SD_ILS/0/SD_ILS:2295275 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Davidoff, Sherri.<br/><a href="https://learning.oreilly.com/library/view/~/9780132565110/?ar">https://learning.oreilly.com/library/view/~/9780132565110/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780132565110/?ar">https://go.oreilly.com/library-access/library/view/-/9780132565110/?ar</a><br/>Format:&#160;Electronic Resources<br/> Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers ent://SD_ILS/0/SD_ILS:2296624 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;O'Connor, T. J.<br/><a href="https://learning.oreilly.com/library/view/~/9781597499576/?ar">https://learning.oreilly.com/library/view/~/9781597499576/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar">https://go.oreilly.com/library-access/library/view/-/9781597499576/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597499576">https://learning.oreilly.com/library/view/~/9781597499576</a><br/>Format:&#160;Electronic Resources<br/> Learning Python for forensics : leverage the power of Python in forensic investigations ent://SD_ILS/0/SD_ILS:2319116 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Miller, Preston, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781789341690/?ar">https://learning.oreilly.com/library/view/~/9781789341690/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar">https://go.oreilly.com/library-access/library/view/-/9781789341690/?ar</a><br/>Format:&#160;Electronic Resources<br/> The future of cyber security and security innovation. ent://SD_ILS/0/SD_ILS:2308889 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Suits and spooks conference (2015 : New York, N.Y.)<br/><a href="https://learning.oreilly.com/videos/~/9781491937198/?ar">https://learning.oreilly.com/videos/~/9781491937198/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar">https://go.oreilly.com/library-access/library/view/-/9781491937198/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis toolkit ent://SD_ILS/0/SD_ILS:2295823 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar">https://go.oreilly.com/library-access/library/view/-/9781597497275/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597497275/?ar">https://learning.oreilly.com/library/view/~/9781597497275/?ar</a><br/>Format:&#160;Electronic Resources<br/> Digital forensics with Kali Linux : perform data acquisition, digital investigation, and threat analysis using Kali Linux tools ent://SD_ILS/0/SD_ILS:2315386 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Parasram, Shiva V. N., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781788625005">https://learning.oreilly.com/library/view/~/9781788625005</a> <a href="https://learning.oreilly.com/library/view/~/9781788625005/?ar">https://learning.oreilly.com/library/view/~/9781788625005/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar">https://go.oreilly.com/library-access/library/view/-/9781788625005/?ar</a><br/>Format:&#160;Electronic Resources<br/> IOS forensic analysis for iPhone, iPad, and iPod Touch ent://SD_ILS/0/SD_ILS:2291230 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Morrissey, Sean.<br/><a href="https://learning.oreilly.com/library/view/~/9781430233428">https://learning.oreilly.com/library/view/~/9781430233428</a> <a href="https://learning.oreilly.com/library/view/~/9781430233428/?ar">https://learning.oreilly.com/library/view/~/9781430233428/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar">https://go.oreilly.com/library-access/library/view/-/9781430233428/?ar</a><br/>Format:&#160;Electronic Resources<br/> Windows forensic analysis DVD toolkit 2E ent://SD_ILS/0/SD_ILS:2287802 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Carvey, Harlan A.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494229/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597494229/?ar">https://learning.oreilly.com/library/view/~/9781597494229/?ar</a><br/>Format:&#160;Electronic Resources<br/> Mobile malware attacks and defense ent://SD_ILS/0/SD_ILS:2294476 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Dunham, Ken.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar">https://go.oreilly.com/library-access/library/view/-/9781597492980/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597492980/?ar">https://learning.oreilly.com/library/view/~/9781597492980/?ar</a><br/>Format:&#160;Electronic Resources<br/> Stealing the network : how to own an identity ent://SD_ILS/0/SD_ILS:2281993 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Alder, Raven.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar">https://go.oreilly.com/library-access/library/view/-/9781597490061/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490061/?ar">https://learning.oreilly.com/library/view/~/9781597490061/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597490061">https://learning.oreilly.com/library/view/~/9781597490061</a> <a href="https://www.sciencedirect.com/science/book/9781597490061">https://www.sciencedirect.com/science/book/9781597490061</a><br/>Format:&#160;Electronic Resources<br/> Android forensics : investigation, analysis, and mobile security for Google Android ent://SD_ILS/0/SD_ILS:2292492 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Hoog, Andrew.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781597496513/?ar">https://go.oreilly.com/library-access/library/view/-/9781597496513/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496513/?ar">https://learning.oreilly.com/library/view/~/9781597496513/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781597496513">https://learning.oreilly.com/library/view/~/9781597496513</a><br/>Format:&#160;Electronic Resources<br/> Malware forensics field guide for Linux systems ent://SD_ILS/0/SD_ILS:2302388 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Malin, Cameron H.<br/><a href="https://learning.oreilly.com/library/view/~/9781597494700/?ar">https://learning.oreilly.com/library/view/~/9781597494700/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar">https://go.oreilly.com/library-access/library/view/-/9781597494700/?ar</a><br/>Format:&#160;Electronic Resources<br/> Scene of the cybercrime : computer forensics handbook ent://SD_ILS/0/SD_ILS:2280756 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;Shinder, Debra Littlejohn, author.<br/><a href="https://learning.oreilly.com/library/view/~/9781931836654">https://learning.oreilly.com/library/view/~/9781931836654</a> <a href="https://learning.oreilly.com/library/view/~/9781931836654/?ar">https://learning.oreilly.com/library/view/~/9781931836654/?ar</a> <a href="https://www.sciencedirect.com/science/book/9781931836654">https://www.sciencedirect.com/science/book/9781931836654</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar">https://go.oreilly.com/library-access/library/view/-/9781931836654/?ar</a><br/>Format:&#160;Electronic Resources<br/> Un monde sous surveillance ? ent://SD_ILS/0/SD_ILS:2196005 2025-07-04T12:43:38Z 2025-07-04T12:43:38Z by&#160;&Eacute;milie Labrot<br/><a href="http://books.openedition.org/pupvd/3947">DOAB: download the publication</a> <a href="https://directory.doabooks.org/handle/20.500.12854/53885">DOAB: description of the publication</a><br/>Format:&#160;Books<br/>