Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'ccl=su:"Computer crimes"'
Refine your search
Availability
Limit to records with available items
Authors
Aquilina, James M
Bejtlich, Richard
Boni, William C
Britz, Marjie
Bryant, Robin
Bunting, Steve
Casey, Eoghan
Colarik, Andrew M
Davidson, Alan
Dunham, Ken
Grabosky, Peter N
Jones, Keith J
Kovacich, Gerald L
Lilley, Peter
Lloyd, Ian J
Malin, Cameron H
Nasheri, Hedieh
Ram Kumar, G
Rose, Curtis W
Smith, Russell G
Show more
Show less
Item types
Books
English Books
Reference
Locations
3RD FLOOR, A WING
4TH FLOOR, A WING
Series
21st Century Skills ...
Topics
Business records - L...
Computer crimes
Computer crimes - Ca...
Computer crimes - Gr...
Computer crimes - In...
Computer crimes - In...
Computer crimes - Pr...
Computer crimes - Un...
Computer crimes - Un...
Computer crimes--Inv...
Computer hackers
Computer networks - ...
Computer security
Computers - Law and ...
Cyberterrorism
Data protection - La...
Electronic commerce ...
Forensic sciences
Internet - Security ...
Internet fraud
Show more
Show less
Your search returned 113 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Macintosh OS X, iPod, and iPhone forensic analysis DVD toolkit
Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor
by
Kubasiak, Ryan R
Morrissey, Sean
Varsalone, Jesse
Publication details:
Rockland, MA
Syngress Pub
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VAR
.
2.
Malicious bots : an inside look into the cyber-criminal underground of the internet
Ken Dunham and Jim Melnick
by
Dunham, Ken
Melnick, Jim
Publication details:
Boca Raton, FL
CRC Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 DUN
.
3.
Malware : fighting malicious code
Ed Skoudis with Lenny Zeltser
by
Skoudis, Ed
Zeltser, Lenny
Publication details:
Upper Saddle River, NJ
Prentice Hall PTR
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SKO
.
4.
Malware forensics : investigating and analyzing malicious code
James M. Aquilina, Eoghan Casey, Cameron H. Malin
by
Aquilina, James M
Casey, Eoghan
Malin, Cameron H
Publication details:
Rockland, MA
Syngress Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AQU
.
5.
Malware forensics field guide for Linux systems
Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor
by
Malin, Cameron H
Aquilina, James M
Casey, Eoghan
Publication details:
Amsterdam
Elsevier
2014
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MAL
.
6.
Managerial guide for handling cyber-terrorism and information warfare
Lech J. Janczewski and Andrew M. Colarik
by
Janczewski, Lech
Colarik, Andrew M
Publication details:
Hershey, PA
Idea Group Publishing
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 JAN
.
7.
Managing the human factor in information security : how to win over staff and influence business managers
David Lacey
by
Lacey, David
Publication details:
Hoboken, NJ
Wiley
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 LAC
.
8.
Mastering Windows network forensics and investigation
Steve Anson, Steve Bunting
by
Anson, Steven James
Bunting, Steve
Publication details:
Hoboken, N.J. ; Chichester
John Wiley [distributor], Wiley
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.432W ANS
.
9.
Masters of deception : the gang that ruled cyberspace
Michelle Slatalla and Joshua Quittner
by
Slatalla, Michelle
Quittner, Joshua
Edition:
1st HarperPerennial ed
Publication details:
New York
Harper Perennial
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.16809747 SLA
.
10.
Media forensics and security II : 18-20 January 2010, San Jose, California, United States
Nasir D. Memon ... [et al.], editors ; sponsored and published by IS & T--the Society for Imaging Science and Technology [and] SPIE ; cosponsored by Digital Watermarking Alliance
by
Memon, Nasir D
Digital Watermarking Alliance, Electronic Imaging Science and Technology Symposium (2010 : San Jose, Calif.), IS & T--the Society for Imaging Science and Technology, SPIE (Society)
Publication details:
Bellingham, WA
SPIE
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MEM
.
11.
Mobile malware attacks and defense
Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.]
by
Dunham, Ken
Publication details:
Amsterdam
Elsevier
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DUN
.
12.
Netspionage : the global threat to information
William Boni, Gerald L. Kovacich
by
Boni, William C
Kovacich, Gerald L
Publication details:
Boston
Butterworth-Heinemann
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 BON
.
13.
Online consumer protection : theories of human relativism
Kuanchin Chen, Adam Fadlalla [editors]
by
Chen, Kuanchin
Fadlalla, Adam
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
381.3402 CHE
.
14.
Policing the Internet
Peggy Daniels, book editor
by
Daniels, Peggy
Publication details:
Detroit, MI
Greenhaven Press
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
354.75 DAN
.
15.
Principles of cybercrime
Jonathan Clough
by
Clough, Jonathan
Publication details:
Cambridge
Cambridge University Press
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.0268 CLO
.
16.
Profiling hackers : the science of criminal profiling as applied to the world of hacking
Raoul Chiesa, Stefania Ducci, Silvio Ciappi
by
Chiesa, Raoul
Ciappi, Silvio
Ducci, Stefania
Publication details:
Boca Raton, FL
Auerbach Publications
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 CHI
.
17.
No cover image available
The hacker diaries : confessions of teenage hackers
Dan Verton
by
Verton, Dan
Publication details:
New York
McGraw-Hill/Osborne
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VER
.
18.
The Internet and crime
by Alan Marzilli
by
Marzilli, Alan
Publication details:
New York
Chelsea House
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.730268 MAR
.
19.
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators
Dave Kleiman....[et..al]
by
Kleiman, Dave
Publication details:
Rockland, MA
Syngress Pub
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 KLE
.
20.
The transnational dimension of cyber crime and terrorism
Rajan Nagia
by
Nagia, Rajan
Edition:
1st ed
Publication details:
New Delhi
[publisher not identified]
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 RAJ
.
21.
Transnational criminal organizations, cybercrime, and money laundering : a handbook for law enforcement officers, auditors, and financial investigators
James R. Richards
by
Richards, James R
Publication details:
Boca Raton, FL
CRC Press
1999
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 RIC
.
22.
Trust and crime in information societies
edited by Robin Mansell and Brian S. Collins
by
Collins, Brian S
Mansell, Robin
Publication details:
Cheltenham, UK ; Northampton, MA
Edward Elgar
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
303.4834 MAN
.
23.
Understanding and managing cybercrime
Samuel C. McQuade, III ; [foreword by Charles Wellford]
by
McQuade, Samuel C
Publication details:
Boston
Pearson/Allyn and Bacon
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 MAC
.
24.
Unix and Linux forensic analysis DVD toolkit
Chris Pogue, Cory Altheide, Todd Haverkos
by
Pogue, Chris
Altheide, Cory
Haverkos, Todd
Publication details:
Burlington, MA
Syngress Publishing
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 POG
.
25.
Zero day threat : the shocking truth of how banks and credit bureaus help cyber crooks steal your money and identity
Byron Acohido and Jon Swartz
by
Acohido, Byron
Swartz, Jon
Publication details:
New York
Union Square Press
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 ACO
.
26.
Windows forensics : the field guide for conducting corporate computer investigations
Chad Steel
by
Steel, Chad
Publication details:
Indianapolis, IN
Wiley Pub
c2006
Availability:
Not available:
Anna Centenary Library: Checked out
(1).
27.
Bullying beyond the schoolyard : preventing and responding to cyber bullying
Sameer Hinduja, Justin W. Patchin
by
Hinduja, Sameer
Patchin, Justin W
Publication details:
Thousand Oaks, CA
Corwin Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
371.58 HIN
.
28.
CD and DVD forensics
Paul Crowley ; Dave Kleiman, technical editor
by
Crowley, Paul
Publication details:
Rockland, MA
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 CRO
.
29.
Cisco router and switch forensics : investigating and analyzing malicious network activity
Dale Liu, lead author and technical editor ; James Burton ... [et al.]
by
Liu, Dale
Publication details:
Burlington, MA
Syngress
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 LIU
.
30.
Collaborative computer security and trust management
[edited by] Jean-Marc Seigneur, Adam Slagell
by
Seigneur, Jean-Marc
Slagell, Adam
Publication details:
Hershey, PA
Information Science Reference
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SEI
.
31.
Computer crime
Paul T. Augastine
by
Augastine, Paul T
Publication details:
New Delhi
Crescent Pub. Corp
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 AUG
.
32.
No cover image available
Computer crimes and digital investigations
Ian Walden
by
Walden, Ian
Publication details:
Oxford
Oxford University Press
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.410268 WAL
.
33.
Computer evidence : collection and preservation
Christopher L.T. Brown
by
Brown, Christopher L. T
Edition:
2nd ed
Publication details:
Boston, MA
Charles River Media/Cengage Learning
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 BRO
.
34.
Computer forensics : evidence collection and management
Robert C. Newman
by
Newman, Robert C
Publication details:
Boca Raton, FL
Auerbach Publications
c2007
Availability:
Not available:
Anna Centenary Library: Checked out
(1).
35.
Computer forensics : principles and practices
Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler
by
Volonino, Linda
Anzaldua, Reynaldo
Godwin, Jana
Edition:
1st ed
Publication details:
Upper Saddle River, N.J
Pearson/Prentice Hall
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 VOL
.
36.
Computer forensics and cyber crime
Marjie T. Britz
by
Britz, Marjie
Edition:
2nd ed
Publication details:
Upper Saddle River, NJ
Pearson Prentice Hall
2012
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25 BRI
.
37.
Computer forensics and cyber crime : an introduction
Marjie T. Britz
by
Britz, Marjie
Edition:
2nd ed
Publication details:
Upper Saddle River, NJ
Pearson Prentice Hall
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25 BRI
.
38.
Confronting cyber-bullying : what schools need to know to control misconduct and avoid legal consequences
Shaheen Shariff
by
Shariff, Shaheen
Publication details:
Cambridge
Cambridge University Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
371.58 SHA
.
39.
Crimeware : understanding new attacks and defenses
Markus Jakobsson, Zulfikar Ramzan
by
Jakobsson, Markus
Ramzan, Zulfikar
Publication details:
Boston
Addison-Wesley
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JAK
.
40.
Cyber crime
Louise I. Gerdes, book editor
by
Gerdes, Louise I
Publication details:
Detroit
Greenhaven Press
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 GER
.
41.
Cyber crime and digital evidence
contributors, Michele Tumminello ... [et al.] ; edited and compiled by Koros Press Editorial Board
by
Tumminello, Michele
Publication details:
London
2015
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.730268 TUM
.
42.
Cyber crime in India : a comparative study
by M. Dasgupta
by
Dasgupta, M
Publication details:
Kolkata
Eastern Law House
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.1680954 DAS
.
43.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors
Anthony Reyes ... [et. al]
by
Reyes, Anthony
Publication details:
Rockland, MA
Syngress Publishing
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 REY
.
44.
Cyber crime investigator's field guide
Bruce Middleton
by
Middleton, Bruce
Edition:
2nd ed
Publication details:
Boca Raton, FL
Auerbach Publications
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25/968 MID
.
45.
Cyber crime: conceptualized and codified
Richard Anderson Kadema Carter
by
Anderson, Richard
Carter, Kadema
Publication details:
New York
Arcler Press
2015
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 AND
.
46.
Cyber criminals on trial
Russell G. Smith, Peter N. Grabosky, Gregor F. Urbas
by
Smith, Russell G
Grabosky, Peter N
Urbas, Gregor
Publication details:
Cambridge
Cambridge University Press
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.730268 SMI
.
47.
Cyber fraud : tactics, techniques, and procedures
editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan ... [et al.]
by
Graham, James
Howard, Richard
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.163 GRA
.
48.
Cyber laws and computer crimes
Rajan Nagia
by
Rajan Nagia
Edition:
1st ed
Publication details:
New Delhi
Cyber Tech Publications
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.09944 RAJ
.
49.
Cyber terrorism : political and economic implications
Andrew Michael Colarik
by
Colarik, Andrew M
Publication details:
Hershey, PA
Idea Group Pub
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.325 COL
.
50.
Cybercrime : an introduction to an emerging phenomenon
George E. Higgins
by
Higgins, George E
Publication details:
Boston
McGraw-Hill Higher Education
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 HIG
.
51.
Cybercrime : law enforcement, security and surveillance in the information age
edited by Douglas Thomas and Brian D. Loader
by
Loader, Brian
Thomas, Douglas
Publication details:
New York
Routledge
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 THO
.
52.
Cybercrime : the transformation of crime in the information age
David S. Wall
by
Wall, David S
Publication details:
Cambridge ; Malden, MA
Polity Press
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 WAL
.
53.
Cybercrime and jurisdiction : a global survey
edited by Bert-Jaap Koops and Susan W. Brenner
by
Brenner, Susan W
Koops, Bert-Jaap
Publication details:
Cambridge ; The Hague ; West Nyack, NY
Cambridge University Press [distributor], TMC Asser
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
003.5 KOO
.
54.
Cybercrime and society
Majid Yar
by
Yar, Majid
Edition:
1st ed
Publication details:
Thousand Oaks, CA
SAGE Publications
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 YAR
.
55.
Cyberlaw for global E-business : finance, payment, and dispute resolution
Takashi Kubota, editor
by
Kubota, Takashi
Publication details:
Hershey, PA
Information Science Reference
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.09944 KUB
.
56.
Digital crime and digital terrorism
Robert W. Taylor ... [et al.]
by
Taylor, Robert W
Publication details:
Upper Saddle River, NJ
Pearson/Prentice Hall
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 TAY
.
57.
Digital crime and forensic science in cyberspace
Panagiotis Kanellis ... [et al., editors]
by
Kanellis, Panagiotis
Publication details:
Hershey, PA
Idea Group Pub
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 KAN
.
58.
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data
Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray
by
Lillard, Terrence
Publication details:
Burlington, MA
Syngress
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.2502854678 LIL
.
59.
Digital security : cyber terror and cyber security
Ananda Mitra
by
Mitra, Ananda
Publication details:
New York
Chelsea House
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 ANA
.
60.
Dissecting the hack : the forb1dd3n network
Jayson E. Street ... [et al.]
by
Street, Jayson E
Edition:
Rev. ed
Publication details:
Amsterdam ; Boston
Syngress
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.4476 STR
.
61.
Electronic crime
Peter Grabosky
by
Grabosky, Peter N
Publication details:
Upper Saddle River, NJ
Pearson Prentice Hall
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 GRA
.
62.
Electronic theft : unlawful acquisition in cyberspace
Peter Grabosky, Russell G. Smith, Gillian Dempsey
by
Grabosky, Peter N
Dempsey, Gillian
Smith, Russell G
Publication details:
Cambridge
Cambridge University Press
2001
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 GRA
.
63.
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide
Steve Bunting
by
Bunting, Steve
Edition:
2nd ed
Publication details:
Indianapolis, Ind
Wiley Pub
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 BUN
.
64.
Encyclopedia of information ethics and security
Marian Quigley [editor]
by
Quigley, Marian
Publication details:
Hershey, PA
Information Science Reference
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
174.900403 QUI
.
65.
Forensic computer crime investigation
Thomas A. Johnson
by
Johnson, Thomas Alfred
Publication details:
Boca Raton, FL ; New York
CRC, Taylor & Francis
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25 JOH
.
66.
Global perspectives in information security : legal, social and international issues
edited by Hossein Bidgoli
by
Bidgoli, Hossein
Publication details:
Hoboken, NJ
J. Wiley & Sons
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.7309944 BID
.
67.
Hacked, attacked & abused : digital crime exposed
Peter Lilley
by
Lilley, Peter
Publication details:
London
Kogan Page
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 LIL
.
68.
Hacker's challenge 2 : test your network security and forensic skills
Mike Schiffman ... [et al.]
by
Schiffman, Mike
Publication details:
New York
McGraw-Hill/Osborne
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SCH
.
69.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions
David Pollino ... [et al.]
by
Pollino, David
Publication details:
New York
McGraw-Hill
c2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 POL
.
70.
Hacking exposed computer forensics
Aaron Philipp, David Cowen, Chris Davis
by
Philipp, Aaron
Cowen, David
Davis, Chris
Edition:
2nd ed
Publication details:
New York
McGraw-Hill/Osborne
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PHI
.
71.
Handbook of computer crime investigation : forensic tools and technology
edited by Eoghan Casey
by
Casey, Eoghan
Publication details:
San Diego, CA
Elsevier / Academic Press
c2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 CAS
.
72.
Handbook of digital forensics and investigation
edited by Eoghan Casey ; with contributions from Cory Altheide ... [et al.]
by
Casey, Eoghan
Publication details:
Amsterdam
Academic Press
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 CAS
.
73.
Handbook of research on computational forensics, digital crime, and investigation : methods and solutions
[edited by] Chang-Tsun Li
by
Li, Chang-Tsun
Publication details:
Hershey, PA
Information Science Reference
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.250285 LI
.
74.
Handbook of research on information security and assurance
Jatinder N.D. Gupta, Sushil K. Sharma [editors]
by
Gupta, Jatinder N. D
Sharma, Sushil K
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 GUP
.
75.
Handbook of research on social and organizational liabilities in information security
[edited by] Manish Gupta, Raj Sharman
by
Gupta, Manish
Sharman, Raj
Publication details:
Hershey, PA
Information Science Reference
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GUP
.
76.
Hawking hits on the information highway : the challenge of online drug sales for law enforcement
Laura L. Finley
by
Finley, Laura L
Publication details:
Bern
Peter Lang
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25977 FIN
.
77.
High-tech crimes revealed : cyberwar stories from the digital front
Steven Branigan ; [foreword by William Cheswick]
by
Branigan, Steven
Publication details:
Boston, MA
Addison-Wesley
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 BRA
.
78.
How personal & internet security works
Preston Gralla
by
Gralla, Preston
Publication details:
Indianapolis, Ind. ; London
Pearson Education [distributor], Que/Sams
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
HV6773 .G7245 2006 005.8
.
79.
Incident response and computer forensics
Chris Prosise, Kevin Mandia
by
Mandia, Kevin
Prosise, Chris
Edition:
2nd ed
Publication details:
New York
McGraw-Hill/Osborne
c2003
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 PRO
.
80.
Information risk and security : preventing and investigating workplace computer crime
Edward Wilding
by
Wilding, Edward
Publication details:
Aldershot, England ; Burlington, VT
Gower
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 WIL
.
81.
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks
Kenneth C. Brancik
by
Brancik, Kenneth C
Publication details:
Boca Raton, FL
Auerbach Publications
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 BRA
.
82.
Internet crimes, torts, and scams : investigation and remedies
Melise R. Blakeslee
by
Blakeslee, Melise R
Publication details:
Oxford
Oxford University Press
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.0268 BLA
.
83.
Internet denial of service : attack and defense mechanisms
Jelena Mirkovic ... [et al.]
by
Mirkovic, Jelena
Publication details:
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIR
.
84.
Intrusion detection in distributed systems : an abstraction-based approach
by Peng Ning, Sushil Jajodia, X. Sean Wang
by
Ning, Peng
Jajodia, Sushil
Wang, Sean
Publication details:
Dorcrecht ; Boston
Kluwer Academic Publishers
2004
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NIN
.
85.
Investigating computer crime
Franklin Clark, Ken Diliberto
by
Clark, Franklin
Diliberto, Ken
Publication details:
Boca Raton, FL
CRC Press
c1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 CLA
.
86.
Investigating computer-related crime
Peter Stephenson
by
Stephenson, Peter
Publication details:
Boca Raton, FL
CRC Press
c2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 STE
.
87.
Investigating high-tech crime
Michael R. Knetzger, Jeremy A. Muraski
by
Knetzger, Michael R
Muraski, Jeremy A
Publication details:
Upper Saddle River, NJ
Pearson/Prentice Hall
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.259680973 KNE
.
88.
IT security metrics : a practical framework for measuring security & protecting data
Lance Hayden
by
Hayden, Lance
Publication details:
New York
McGraw Hill
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAY
.
89.
I-way robbery : crime on the Internet
William C. Boni and Gerald L. Kovacich
by
Boni, William C
Kovacich, Gerald L
Publication details:
Oxford, UK ; Burlington, MA
Butterworth-Heinemann
c1999
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 BON
.
90.
Law on the electronic frontier
Ian J. Lloyd and Moira Simpson
by
Lloyd, Ian J
Simpson, Moira
David Hume Institute
Publication details:
Edinburgh
Edinburgh University Press
1994
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
344.103999 LLO
.
91.
Computer security
John M. Carroll
by
Carroll, John M
Edition:
3rd ed
Publication details:
Oxford
Butterworth-Heinemann
1996
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 CAR
.
92.
Cyber crimes : a primer on internet threats and email abuses
G.Ram Kumar
by
Ram Kumar, G
Publication details:
New Delhi
Viva Books
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 RAM
.
93.
Cyber crimes : a primer on Internet threats and email abuses
G.Ram Kumar
by
Ram Kumar, G
Publication details:
New Delhi
Viva Books
2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 RAM
.
94.
Cybercrime
Sylvia Engdahl, book editor
by
Engdahl, Sylvia
Publication details:
Detroit
Greenhaven Press
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
345.730268 ENG
.
95.
Cybercrime
Jeffrey Ian Ross
by
Ross, Jeffrey Ian
Publication details:
New York
Chelsea House
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 ROS
.
96.
Economic espionage and industrial spying
Hedieh Nasheri
by
Nasheri, Hedieh
Publication details:
Cambridge
Cambridge University Press
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 NAS
.
97.
Economic espionage and industrial spying
Hedieh Nasheri
by
Nasheri, Hedieh
Publication details:
Cambridge
Cambridge University Press
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 NAS
.
98.
Guide to computer forensics and investigations
by Bill Nelson ... [et al.]
by
Nelson, Bill
Edition:
3rd ed
Publication details:
Boston, MA
Thomson Course Technology
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 NEL
.
99.
Information Technology law
Ian J. Lloyd
by
Lloyd, Ian J
Edition:
4th ed
Publication details:
Oxford
Oxford University Press
[2004]
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.410999 LLO
.
100.
Information Technology law
Ian J. Lloyd
by
Lloyd, Ian J
Edition:
5th ed
Publication details:
Oxford
Oxford University Press
2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
004.3554 LLO
.
101.
Investigating digital crime
edited by Robin Bryant
by
Bryant, Robin
Publication details:
Hoboken, NJ
J. Wiley & Sons
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 BRY
.
102.
Investigating digital crime
edited by Robin Bryant
by
Bryant, Robin
Publication details:
Hoboken, NJ
J. Wiley & Sons
c2008
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 BRY
.
103.
Real digital forensics : computer security and incident response
Keith J. Jones, Richard Bejtlich, Curtis W. Rose
by
Jones, Keith J
Bejtlich, Richard
Rose, Curtis W
Publication details:
Boston, MA
Addison Wesley
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 JON
.
104.
The law of electronic commerce
Alan Davidson
by
Davidson, Alan
Publication details:
Cambridge
Cambridge University Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
343.940999 DAV
.
105.
Alternate data storage forensics
Tyler Cohen, Amber Schroader
by
Cohen, Tyler
Schroader, Amber
Publication details:
Burlington
Syngress
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 COH
.
106.
At Large: The Strange Case of the World's Biggest Internet Invasion
David H Freedman; Charles C Mann
by
Freedman, David H
Mann, Charles C
Publication details:
New York
Simon & Schuster
1997
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.1680973 FRE
.
107.
Real digital forensics : computer security and incident response
Keith J. Jones, Richard Bejtlich, Curtis W. Rose
by
Jones, Keith J
Bejtlich, Richard
Rose, Curtis W
Publication details:
Boston, MA
Addison Wesley
2005
Availability:
No items available.
108.
The law of electronic commerce
Alan Davidson
by
Davidson, Alan
Publication details:
Cambridge
Cambridge University Press
2009
Availability:
No items available.
109.
The law of electronic commerce
Alan Davidson
by
Davidson, Alan
Publication details:
Cambridge
Cambridge University Press
2009
Availability:
No items available.
110.
Cybercrime and digital forensics
edited by Jason Wayne
by
Wayne, Jason
Language:
English
Publication details:
New York
Clanrye International
2018
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.25968 WAY
.
111.
Cyber cop
Patricia Freeland Hynes
by
Hynes, Patricia Freeland
Series:
21st Century Skills Library
; Cool Science Careers
Edition:
Reprint
Language:
English
Publication details:
Ann Arbor
Cherry Lake Publishing
2019
Availability:
Items available for loan:
Anna Centenary Library
(4)
Call number:
363.259680973 HYN, ..
.
112.
Scene of the cybercrime :Computer Forensics
by Siti Rahayu Selamat ,Shahrin Sahib et al.
by
Selamat, Siti Rahayu
Language:
English
Publication details:
United kingdom
Koros Press Limited
2015
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 SEL
.
113.
The Cybersecurity Playbook for Modern Enterprises
/ Wittkop, Jeremy
by
JEREMY WITTKOP
Language:
English
Publication details:
BIRMINGHAM
Packt
2022
Availability:
Items available for loan:
Anna Centenary Library
(2)
Call number:
005.8 WIT, ..
.
Pages
Find us on the map
Powered by
Koha