Your search returned 34 results.

Sort
Results
1.
Malware forensics : investigating and analyzing malicious code James M. Aquilina, Eoghan Casey, Cameron H. Malin by
Publication details: Rockland, MA Syngress Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 AQU.

2.
Malware forensics field guide for Linux systems Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor by
Publication details: Amsterdam Elsevier 2014
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 MAL.

3.
Mastering Windows network forensics and investigation Steve Anson, Steve Bunting by
Publication details: Hoboken, N.J. ; Chichester John Wiley [distributor], Wiley c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.432W ANS.

4.
5.
Unix and Linux forensic analysis DVD toolkit Chris Pogue, Cory Altheide, Todd Haverkos by
Publication details: Burlington, MA Syngress Publishing c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 POG.

6.
Windows forensics : the field guide for conducting corporate computer investigations Chad Steel by
Publication details: Indianapolis, IN Wiley Pub c2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 STE.

7.
Cisco router and switch forensics : investigating and analyzing malicious network activity Dale Liu, lead author and technical editor ; James Burton ... [et al.] by
Publication details: Burlington, MA Syngress c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 LIU.

8.
Computer crimes and digital investigations Ian Walden by
Publication details: Oxford Oxford University Press 2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.410268 WAL.

9.
Computer evidence : collection and preservation Christopher L.T. Brown by
Edition: 2nd ed
Publication details: Boston, MA Charles River Media/Cengage Learning c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BRO.

10.
Computer forensics : evidence collection and management Robert C. Newman by
Publication details: Boca Raton, FL Auerbach Publications c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.730268 NEW.

11.
Cyber crime and digital evidence contributors, Michele Tumminello ... [et al.] ; edited and compiled by Koros Press Editorial Board by
Publication details: London 2015
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.730268 TUM.

12.
Cyber crime investigations : bridging the gaps between security professionals, law enforcement, and prosecutors Anthony Reyes ... [et. al] by
Publication details: Rockland, MA Syngress Publishing c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 REY.

13.
Cyber crime investigator's field guide Bruce Middleton by
Edition: 2nd ed
Publication details: Boca Raton, FL Auerbach Publications c2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25/968 MID.

14.
Digital crime and digital terrorism Robert W. Taylor ... [et al.] by
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 TAY.

15.
Digital forensics for network, Internet, and cloud computing : a forensic evidence guide for moving targets and data Terrence V. Lillard ... [et al.] ; technical editor, Jim Murray by
Publication details: Burlington, MA Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.2502854678 LIL.

16.
Dissecting the hack : the forb1dd3n network Jayson E. Street ... [et al.] by
Edition: Rev. ed
Publication details: Amsterdam ; Boston Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 STR.

17.
EnCase computer forensics : the official EnCE : EnCase certified examiner study guide Steve Bunting by
Edition: 2nd ed
Publication details: Indianapolis, Ind Wiley Pub c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BUN.

18.
Forensic computer crime investigation Thomas A. Johnson by
Publication details: Boca Raton, FL ; New York CRC, Taylor & Francis 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25 JOH.

19.
Hacking exposed computer forensics Aaron Philipp, David Cowen, Chris Davis by
Edition: 2nd ed
Publication details: New York McGraw-Hill/Osborne c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PHI.

20.
Handbook of computer crime investigation : forensic tools and technology edited by Eoghan Casey by
Publication details: San Diego, CA Elsevier / Academic Press c2002
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CAS.

21.
Handbook of digital forensics and investigation edited by Eoghan Casey ; with contributions from Cory Altheide ... [et al.] by
Publication details: Amsterdam Academic Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CAS.

22.
Hawking hits on the information highway : the challenge of online drug sales for law enforcement Laura L. Finley by
Publication details: Bern Peter Lang c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25977 FIN.

23.
Incident response and computer forensics Chris Prosise, Kevin Mandia by
Edition: 2nd ed
Publication details: New York McGraw-Hill/Osborne c2003
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 PRO.

24.
Information risk and security : preventing and investigating workplace computer crime Edward Wilding by
Publication details: Aldershot, England ; Burlington, VT Gower 2006
Availability: Items available for loan: Anna Centenary Library (1)Call number: 658.478 WIL.

25.
Internet crimes, torts, and scams : investigation and remedies Melise R. Blakeslee by
Publication details: Oxford Oxford University Press c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 345.0268 BLA.

26.
Intrusion detection in distributed systems : an abstraction-based approach by Peng Ning, Sushil Jajodia, X. Sean Wang by
Publication details: Dorcrecht ; Boston Kluwer Academic Publishers 2004
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NIN.

27.
Investigating computer crime Franklin Clark, Ken Diliberto by
Publication details: Boca Raton, FL CRC Press c1996
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 CLA.

28.
Investigating high-tech crime Michael R. Knetzger, Jeremy A. Muraski by
Publication details: Upper Saddle River, NJ Pearson/Prentice Hall c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.259680973 KNE.

29.
Guide to computer forensics and investigations by Bill Nelson ... [et al.] by
Edition: 3rd ed
Publication details: Boston, MA Thomson Course Technology c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 NEL.

30.
Investigating digital crime edited by Robin Bryant by
Publication details: Hoboken, NJ J. Wiley & Sons c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BRY.

31.
Investigating digital crime edited by Robin Bryant by
Publication details: Hoboken, NJ J. Wiley & Sons c2008
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 BRY.

32.
Real digital forensics : computer security and incident response Keith J. Jones, Richard Bejtlich, Curtis W. Rose by
Publication details: Boston, MA Addison Wesley 2005
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 JON.

33.
Alternate data storage forensics Tyler Cohen, Amber Schroader by
Publication details: Burlington Syngress c2007
Availability: Items available for loan: Anna Centenary Library (1)Call number: 363.25968 COH.

34.
Pages

Find us on the map

Powered by Koha