Your search returned 113 results.

Sort
Results
1.
2.
Malicious bots : an inside look into the cyber-criminal underground of the internet Ken Dunham and Jim Melnick by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 DUN.

3.
Malware : fighting malicious code Ed Skoudis with Lenny Zeltser by
Publication details: Upper Saddle River, NJ Prentice Hall PTR 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SKO.

4.
Malware forensics : investigating and analyzing malicious code James M. Aquilina, Eoghan Casey, Cameron H. Malin by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AQU.

5.
Malware forensics field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor by
Publication details: Amsterdam Elsevier 2014
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MAL.

6.
Managerial guide for handling cyber-terrorism and information warfare Lech J. Janczewski and Andrew M. Colarik by
Publication details: Hershey, PA Idea Group Publishing 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 JAN.

7.
Managing the human factor in information security : how to win over staff and influence business managers David Lacey by
Publication details: Hoboken, NJ Wiley 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 LAC.

8.
Mastering Windows network forensics and investigation Steve Anson, Steve Bunting by
Publication details: Hoboken, N.J. ; Chichester John Wiley [distributor], Wiley c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432W ANS.

9.
Masters of deception : the gang that ruled cyberspace Michelle Slatalla and Joshua Quittner by
Edition: 1st HarperPerennial ed
Publication details: New York Harper Perennial 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.16809747 SLA.

10.
11.
Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] by
Publication details: Amsterdam Elsevier c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DUN.

12.
Netspionage : the global threat to information William Boni, Gerald L. Kovacich by
Publication details: Boston Butterworth-Heinemann 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 BON.

13.
Online consumer protection : theories of human relativism Kuanchin Chen, Adam Fadlalla [editors] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 381.3402 CHE.

14.
Policing the Internet Peggy Daniels, book editor by
Publication details: Detroit, MI Greenhaven Press c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 354.75 DAN.

15.
Principles of cybercrime Jonathan Clough by
Publication details: Cambridge Cambridge University Press 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.0268 CLO.

16.
Profiling hackers : the science of criminal profiling as applied to the world of hacking Raoul Chiesa, Stefania Ducci, Silvio Ciappi by
Publication details: Boca Raton, FL Auerbach Publications c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CHI.

17.
The hacker diaries : confessions of teenage hackers Dan Verton by
Publication details: New York McGraw-Hill/Osborne c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VER.

18.
The Internet and crime by Alan Marzilli by
Publication details: New York Chelsea House c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.730268 MAR.

19.
The official CHFI exam 312-49 study guide : for computer hacking forensics investigators Dave Kleiman....[et..al] by
Publication details: Rockland, MA Syngress Pub c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 KLE.

20.
The transnational dimension of cyber crime and terrorism Rajan Nagia by
Edition: 1st ed
Publication details: New Delhi [publisher not identified] 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 RAJ.

21.
Transnational criminal organizations, cybercrime, and money laundering : a handbook for law enforcement officers, auditors, and financial investigators James R. Richards by
Publication details: Boca Raton, FL CRC Press 1999
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 RIC.

22.
Trust and crime in information societies edited by Robin Mansell and Brian S. Collins by
Publication details: Cheltenham, UK ; Northampton, MA Edward Elgar 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 303.4834 MAN.

23.
Understanding and managing cybercrime Samuel C. McQuade, III ; [foreword by Charles Wellford] by
Publication details: Boston Pearson/Allyn and Bacon c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 MAC.

24.
Unix and Linux forensic analysis DVD toolkit Chris Pogue, Cory Altheide, Todd Haverkos by
Publication details: Burlington, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 POG.

25.
Zero day threat : the shocking truth of how banks and credit bureaus help cyber crooks steal your money and identity Byron Acohido and Jon Swartz by
Publication details: New York Union Square Press c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 ACO.

26.
Windows forensics : the field guide for conducting corporate computer investigations Chad Steel by
Publication details: Indianapolis, IN Wiley Pub c2006
Availability: Not available: Anna Centenary Library: Checked out (1).

27.
Bullying beyond the schoolyard : preventing and responding to cyber bullying Sameer Hinduja, Justin W. Patchin by
Publication details: Thousand Oaks, CA Corwin Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 371.58 HIN.

28.
CD and DVD forensics Paul Crowley ; Dave Kleiman, technical editor by
Publication details: Rockland, MA Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CRO.

29.
Cisco router and switch forensics : investigating and analyzing malicious network activity Dale Liu, lead author and technical editor ; James Burton ... [et al.] by
Publication details: Burlington, MA Syngress c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LIU.

30.
Collaborative computer security and trust management [edited by] Jean-Marc Seigneur, Adam Slagell by
Publication details: Hershey, PA Information Science Reference c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SEI.

31.
Computer crime Paul T. Augastine by
Publication details: New Delhi Crescent Pub. Corp 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AUG.

32.
Computer crimes and digital investigations Ian Walden by
Publication details: Oxford Oxford University Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.410268 WAL.

33.
Computer evidence : collection and preservation Christopher L.T. Brown by
Edition: 2nd ed
Publication details: Boston, MA Charles River Media/Cengage Learning c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BRO.

34.
Computer forensics : evidence collection and management Robert C. Newman by
Publication details: Boca Raton, FL Auerbach Publications c2007
Availability: Not available: Anna Centenary Library: Checked out (1).

35.
Computer forensics : principles and practices Linda Volonino, Reynaldo Anzaldua, Jana Godwin ; contributing author, Gary C. Kessler by
Edition: 1st ed
Publication details: Upper Saddle River, N.J Pearson/Prentice Hall c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 VOL.

36.
Computer forensics and cyber crime Marjie T. Britz by
Edition: 2nd ed
Publication details: Upper Saddle River, NJ Pearson Prentice Hall 2012
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25 BRI.

37.
Computer forensics and cyber crime : an introduction Marjie T. Britz by
Edition: 2nd ed
Publication details: Upper Saddle River, NJ Pearson Prentice Hall c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25 BRI.

38.
Confronting cyber-bullying : what schools need to know to control misconduct and avoid legal consequences Shaheen Shariff by
Publication details: Cambridge Cambridge University Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 371.58 SHA.

39.
Crimeware : understanding new attacks and defenses Markus Jakobsson, Zulfikar Ramzan by
Publication details: Boston Addison-Wesley c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JAK.

40.
Cyber crime Louise I. Gerdes, book editor by
Publication details: Detroit Greenhaven Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 GER.

41.
Cyber crime and digital evidence contributors, Michele Tumminello ... [et al.] ; edited and compiled by Koros Press Editorial Board by
Publication details: London 2015
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.730268 TUM.

42.
Cyber crime in India : a comparative study by M. Dasgupta by
Publication details: Kolkata Eastern Law House 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.1680954 DAS.

43.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors Anthony Reyes ... [et. al] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 REY.

44.
Cyber crime investigator's field guide Bruce Middleton by
Edition: 2nd ed
Publication details: Boca Raton, FL Auerbach Publications c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25/968 MID.

45.
Cyber crime: conceptualized and codified Richard Anderson Kadema Carter by
Publication details: New York Arcler Press 2015
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 AND.

46.
Cyber criminals on trial Russell G. Smith, Peter N. Grabosky, Gregor F. Urbas by
Publication details: Cambridge Cambridge University Press 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.730268 SMI.

47.
Cyber fraud : tactics, techniques, and procedures editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan ... [et al.] by
Publication details: Boca Raton, FL CRC Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.163 GRA.

48.
Cyber laws and computer crimes Rajan Nagia by
Edition: 1st ed
Publication details: New Delhi Cyber Tech Publications 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.09944 RAJ.

49.
Cyber terrorism : political and economic implications Andrew Michael Colarik by
Publication details: Hershey, PA Idea Group Pub c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.325 COL.

50.
Cybercrime : an introduction to an emerging phenomenon George E. Higgins by
Publication details: Boston McGraw-Hill Higher Education 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 HIG.

51.
Cybercrime : law enforcement, security and surveillance in the information age edited by Douglas Thomas and Brian D. Loader by
Publication details: New York Routledge 2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 THO.

52.
Cybercrime : the transformation of crime in the information age David S. Wall by
Publication details: Cambridge ; Malden, MA Polity Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 WAL.

53.
Cybercrime and jurisdiction : a global survey edited by Bert-Jaap Koops and Susan W. Brenner by
Publication details: Cambridge ; The Hague ; West Nyack, NY Cambridge University Press [distributor], TMC Asser c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 003.5 KOO.

54.
Cybercrime and society Majid Yar by
Edition: 1st ed
Publication details: Thousand Oaks, CA SAGE Publications 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 YAR.

55.
Cyberlaw for global E-business : finance, payment, and dispute resolution Takashi Kubota, editor by
Publication details: Hershey, PA Information Science Reference c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.09944 KUB.

56.
Digital crime and digital terrorism Robert W. Taylor ... [et al.] by
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 TAY.

57.
Digital crime and forensic science in cyberspace Panagiotis Kanellis ... [et al., editors] by
Publication details: Hershey, PA Idea Group Pub c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 KAN.

58.
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray by
Publication details: Burlington, MA Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.2502854678 LIL.

59.
Digital security : cyber terror and cyber security Ananda Mitra by
Publication details: New York Chelsea House 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 ANA.

60.
Dissecting the hack : the forb1dd3n network Jayson E. Street ... [et al.] by
Edition: Rev. ed
Publication details: Amsterdam ; Boston Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 STR.

61.
Electronic crime Peter Grabosky by
Publication details: Upper Saddle River, NJ Pearson Prentice Hall 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 GRA.

62.
Electronic theft : unlawful acquisition in cyberspace Peter Grabosky, Russell G. Smith, Gillian Dempsey by
Publication details: Cambridge Cambridge University Press 2001
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 GRA.

63.
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide Steve Bunting by
Edition: 2nd ed
Publication details: Indianapolis, Ind Wiley Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BUN.

64.
Encyclopedia of information ethics and security Marian Quigley [editor] by
Publication details: Hershey, PA Information Science Reference c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 174.900403 QUI.

65.
Forensic computer crime investigation Thomas A. Johnson by
Publication details: Boca Raton, FL ; New York CRC, Taylor & Francis 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25 JOH.

66.
Global perspectives in information security : legal, social and international issues edited by Hossein Bidgoli by
Publication details: Hoboken, NJ J. Wiley & Sons 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.7309944 BID.

67.
Hacked, attacked & abused : digital crime exposed Peter Lilley by
Publication details: London Kogan Page 2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 LIL.

68.
Hacker's challenge 2 : test your network security and forensic skills Mike Schiffman ... [et al.] by
Publication details: New York McGraw-Hill/Osborne c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 SCH.

69.
Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions David Pollino ... [et al.] by
Publication details: New York McGraw-Hill c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 POL.

70.
Hacking exposed computer forensics Aaron Philipp, David Cowen, Chris Davis by
Edition: 2nd ed
Publication details: New York McGraw-Hill/Osborne c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PHI.

71.
Handbook of computer crime investigation : forensic tools and technology edited by Eoghan Casey by
Publication details: San Diego, CA Elsevier / Academic Press c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CAS.

72.
Handbook of digital forensics and investigation edited by Eoghan Casey ; with contributions from Cory Altheide ... [et al.] by
Publication details: Amsterdam Academic Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CAS.

73.
Handbook of research on computational forensics, digital crime, and investigation : methods and solutions [edited by] Chang-Tsun Li by
Publication details: Hershey, PA Information Science Reference c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.250285 LI.

74.
Handbook of research on information security and assurance Jatinder N.D. Gupta, Sushil K. Sharma [editors] by
Publication details: Hershey, PA Information Science Reference c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 GUP.

75.
Handbook of research on social and organizational liabilities in information security [edited by] Manish Gupta, Raj Sharman by
Publication details: Hershey, PA Information Science Reference 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 GUP.

76.
Hawking hits on the information highway : the challenge of online drug sales for law enforcement Laura L. Finley by
Publication details: Bern Peter Lang c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25977 FIN.

77.
High-tech crimes revealed : cyberwar stories from the digital front Steven Branigan ; [foreword by William Cheswick] by
Publication details: Boston, MA Addison-Wesley 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 BRA.

78.
How personal & internet security works Preston Gralla by
Publication details: Indianapolis, Ind. ; London Pearson Education [distributor], Que/Sams 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: HV6773 .G7245 2006 005.8.

79.
Incident response and computer forensics Chris Prosise, Kevin Mandia by
Edition: 2nd ed
Publication details: New York McGraw-Hill/Osborne c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PRO.

80.
Information risk and security : preventing and investigating workplace computer crime Edward Wilding by
Publication details: Aldershot, England ; Burlington, VT Gower 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 WIL.

81.
Insider computer fraud : an in-depth framework for detecting and defending against insider IT attacks Kenneth C. Brancik by
Publication details: Boca Raton, FL Auerbach Publications c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 BRA.

82.
Internet crimes, torts, and scams : investigation and remedies Melise R. Blakeslee by
Publication details: Oxford Oxford University Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.0268 BLA.

83.
Internet denial of service : attack and defense mechanisms Jelena Mirkovic ... [et al.] by
Publication details: Upper Saddle River, NJ Prentice Hall Professional Technical Reference c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MIR.

84.
Intrusion detection in distributed systems : an abstraction-based approach by Peng Ning, Sushil Jajodia, X. Sean Wang by
Publication details: Dorcrecht ; Boston Kluwer Academic Publishers 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NIN.

85.
Investigating computer crime Franklin Clark, Ken Diliberto by
Publication details: Boca Raton, FL CRC Press c1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CLA.

86.
Investigating computer-related crime Peter Stephenson by
Publication details: Boca Raton, FL CRC Press c2000
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 STE.

87.
Investigating high-tech crime Michael R. Knetzger, Jeremy A. Muraski by
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.259680973 KNE.

88.
IT security metrics : a practical framework for measuring security & protecting data Lance Hayden by
Publication details: New York McGraw Hill c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 HAY.

89.
I-way robbery : crime on the Internet William C. Boni and Gerald L. Kovacich by
Publication details: Oxford, UK ; Burlington, MA Butterworth-Heinemann c1999
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 BON.

90.
Law on the electronic frontier Ian J. Lloyd and Moira Simpson by
Publication details: Edinburgh Edinburgh University Press 1994
Availability: Items available for loan: Anna Centenary Library (1)Call number: 344.103999 LLO.

91.
Computer security John M. Carroll by
Edition: 3rd ed
Publication details: Oxford Butterworth-Heinemann 1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 CAR.

92.
Cyber crimes : a primer on internet threats and email abuses G.Ram Kumar by
Publication details: New Delhi Viva Books 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 RAM.

93.
Cyber crimes : a primer on Internet threats and email abuses G.Ram Kumar by
Publication details: New Delhi Viva Books 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 RAM.

94.
Cybercrime Sylvia Engdahl, book editor by
Publication details: Detroit Greenhaven Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.730268 ENG.

95.
Cybercrime Jeffrey Ian Ross by
Publication details: New York Chelsea House c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 ROS.

96.
Economic espionage and industrial spying Hedieh Nasheri by
Publication details: Cambridge Cambridge University Press 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 NAS.

97.
Economic espionage and industrial spying Hedieh Nasheri by
Publication details: Cambridge Cambridge University Press 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 NAS.

98.
Guide to computer forensics and investigations by Bill Nelson ... [et al.] by
Edition: 3rd ed
Publication details: Boston, MA Thomson Course Technology c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NEL.

99.
Information Technology law Ian J. Lloyd by
Edition: 4th ed
Publication details: Oxford Oxford University Press [2004]
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.410999 LLO.

100.
Information Technology law Ian J. Lloyd by
Edition: 5th ed
Publication details: Oxford Oxford University Press 2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 004.3554 LLO.

101.
Investigating digital crime edited by Robin Bryant by
Publication details: Hoboken, NJ J. Wiley & Sons c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BRY.

102.
Investigating digital crime edited by Robin Bryant by
Publication details: Hoboken, NJ J. Wiley & Sons c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BRY.

103.
Real digital forensics : computer security and incident response Keith J. Jones, Richard Bejtlich, Curtis W. Rose by
Publication details: Boston, MA Addison Wesley 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JON.

104.
The law of electronic commerce Alan Davidson by
Publication details: Cambridge Cambridge University Press 2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 343.940999 DAV.

105.
Alternate data storage forensics Tyler Cohen, Amber Schroader by
Publication details: Burlington Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 COH.

106.
At Large: The Strange Case of the World's Biggest Internet Invasion David H Freedman; Charles C Mann by
Publication details: New York Simon & Schuster 1997
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.1680973 FRE.

107.
108.
The law of electronic commerce Alan Davidson by
Publication details: Cambridge Cambridge University Press 2009
Availability: No items available.

109.
The law of electronic commerce Alan Davidson by
Publication details: Cambridge Cambridge University Press 2009
Availability: No items available.

110.
Cybercrime and digital forensics edited by Jason Wayne by Language: English
Publication details: New York Clanrye International 2018
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 WAY.

111.
Cyber cop Patricia Freeland Hynes by Series: 21st Century Skills Library ; Cool Science Careers
Edition: Reprint
Language: English
Publication details: Ann Arbor Cherry Lake Publishing 2019
Availability: Items available for loan: Anna Centenary Library (4)Call number: 363.259680973 HYN, ...

112.
Scene of the cybercrime :Computer Forensics by Siti Rahayu Selamat ,Shahrin Sahib et al. by Language: English
Publication details: United kingdom Koros Press Limited 2015
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 SEL.

113.
The Cybersecurity Playbook for Modern Enterprises / Wittkop, Jeremy by Language: English
Publication details: BIRMINGHAM Packt 2022
Availability: Items available for loan: Anna Centenary Library (2)Call number: 005.8 WIT, ...

Pages

Find us on the map

Powered by Koha