Your search returned 7 results.

Sort
Results
1.
Malicious bots : an inside look into the cyber-criminal underground of the internet Ken Dunham and Jim Melnick by
Publication details: Boca Raton, FL CRC Press c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.168 DUN.

2.
Mobile malware attacks and defense Ken Dunham, technical editor ; Saeed Abu-Nimeh ... [et al.] by
Publication details: Amsterdam Elsevier c2009
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.8 DUN.

3.
Cases on technologies for teaching criminology and victimology : methodologies and practices [edited by] Raffaella Sette by
Publication details: Hershey, PA Information Science Reference 2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.071 SET.

4.
Dissecting the hack : the forb1dd3n network Jayson E. Street ... [et al.] by
Edition: Rev. ed
Publication details: Amsterdam ; Boston Syngress c2010
Availability: Items available for loan: Anna Centenary Library (1)Call number: 005.4476 STR.

5.
In the name of love : and other true cases Ann Rule by
Publication details: New York Pocket Books c1998
Availability: Items available for loan: Anna Centenary Library (1)Call number: 364.15230973 RUL.

6.
The world's worst crimes: A-Z of evil deeds Charlotte Greig by
Publication details: London Arcturus Pub 2007
Availability: Items available for loan: Anna Centenary Library (2)Call number: 364.15 GRE, ...

7.
The world's worst crimes: A-Z of evil deeds Charlotte Greig by
Publication details: London Arcturus Pub 2007
Availability: No items available.

Pages

Find us on the map

Powered by Koha