Skip to main content
Anna Centenary Library
Lists
Public lists
கணினி1
View all
Your cookies
Search history
Clear
Search the Library Catalogue
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Accession No.
Go
Advanced search
Search
Library catalog
Title
Author
Subject
ISBN
ISSN
Series
Call number
Go
Advanced search
Authority search
Tag cloud
Library
Log in to your account
×
Login:
Password:
Home
Advanced search
Results of search for 'su:"Computer crimes - Prevention"'
Refine your search
Availability
Limit to records with available items
Authors
Branigan, Steven
Daniels, Peggy
Dunham, Ken
Grabosky, Peter N
Graham, James
Gupta, Jatinder N. D
Gupta, Manish
Hayden, Lance
Howard, Richard
Lacey, David
Li, Chang-Tsun
Lilley, Peter
Loader, Brian
Mirkovic, Jelena
Seigneur, Jean-Marc
Sharma, Sushil K
Sharman, Raj
Slagell, Adam
Thomas, Douglas
Wilding, Edward
Show more
Show less
Item types
Books
English Books
Topics
Cell phone systems -...
Computer crimes
Computer crimes - In...
Computer crimes - Pr...
Computer crimes - Pr...
Computer crimes - Pr...
Computer hackers
Computer networks - ...
Computer security
Computer security - ...
Data protection - Ev...
Forensic sciences
Industries - Securit...
Information technolo...
Information technolo...
Internet - Security ...
Management informati...
Mobile communication...
Mobile computing - S...
Public key infrastru...
Show more
Show less
Your search returned 15 results.
Sort
Sort by:
Relevance
Popularity (most to least)
Popularity (least to most)
Author (A-Z)
Author (Z-A)
Call number (0-9 to A-Z)
Call number (Z-A to 9-0)
Publication/Copyright date: Newest to oldest
Publication/Copyright date: Oldest to newest
Acquisition date: Newest to oldest
Acquisition date: Oldest to newest
Title (A-Z)
Title (Z-A)
Unhighlight
Highlight
Select all
Clear all
Select titles to:
Add to...
[ New list ]
Results
1.
Managing the human factor in information security : how to win over staff and influence business managers
David Lacey
by
Lacey, David
Publication details:
Hoboken, NJ
Wiley
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 LAC
.
2.
Mobile malware attacks and defense
Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.]
by
Dunham, Ken
Publication details:
Amsterdam
Elsevier
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 DUN
.
3.
Policing the Internet
Peggy Daniels, book editor
by
Daniels, Peggy
Publication details:
Detroit, MI
Greenhaven Press
c2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
354.75 DAN
.
4.
Collaborative computer security and trust management
[edited by] Jean-Marc Seigneur, Adam Slagell
by
Seigneur, Jean-Marc
Slagell, Adam
Publication details:
Hershey, PA
Information Science Reference
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 SEI
.
5.
Cyber fraud : tactics, techniques, and procedures
editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan ... [et al.]
by
Graham, James
Howard, Richard
Publication details:
Boca Raton, FL
CRC Press
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.163 GRA
.
6.
Cybercrime : law enforcement, security and surveillance in the information age
edited by Douglas Thomas and Brian D. Loader
by
Loader, Brian
Thomas, Douglas
Publication details:
New York
Routledge
2000
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 THO
.
7.
Electronic crime
Peter Grabosky
by
Grabosky, Peter N
Publication details:
Upper Saddle River, NJ
Pearson Prentice Hall
2007
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 GRA
.
8.
Hacked, attacked & abused : digital crime exposed
Peter Lilley
by
Lilley, Peter
Publication details:
London
Kogan Page
2002
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 LIL
.
9.
Handbook of research on computational forensics, digital crime, and investigation : methods and solutions
[edited by] Chang-Tsun Li
by
Li, Chang-Tsun
Publication details:
Hershey, PA
Information Science Reference
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
363.250285 LI
.
10.
Handbook of research on information security and assurance
Jatinder N.D. Gupta, Sushil K. Sharma [editors]
by
Gupta, Jatinder N. D
Sharma, Sushil K
Publication details:
Hershey, PA
Information Science Reference
c2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 GUP
.
11.
Handbook of research on social and organizational liabilities in information security
[edited by] Manish Gupta, Raj Sharman
by
Gupta, Manish
Sharman, Raj
Publication details:
Hershey, PA
Information Science Reference
2009
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 GUP
.
12.
High-tech crimes revealed : cyberwar stories from the digital front
Steven Branigan ; [foreword by William Cheswick]
by
Branigan, Steven
Publication details:
Boston, MA
Addison-Wesley
2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
364.168 BRA
.
13.
Information risk and security : preventing and investigating workplace computer crime
Edward Wilding
by
Wilding, Edward
Publication details:
Aldershot, England ; Burlington, VT
Gower
2006
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
658.478 WIL
.
14.
Internet denial of service : attack and defense mechanisms
Jelena Mirkovic ... [et al.]
by
Mirkovic, Jelena
Publication details:
Upper Saddle River, NJ
Prentice Hall Professional Technical Reference
c2005
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 MIR
.
15.
IT security metrics : a practical framework for measuring security & protecting data
Lance Hayden
by
Hayden, Lance
Publication details:
New York
McGraw Hill
c2010
Availability:
Items available for loan:
Anna Centenary Library
(1)
Call number:
005.8 HAY
.
Pages
Find us on the map
Powered by
Koha